Vocab Flashcards
For Quizes
Acceptable Risk
A risk that is understood and tolerated by a system’s user, operator, owner, or accreditor, usually because the cost or difficulty of implementing an effective countermeasure for the associated vulnerability exceeds the expectation of loss. (See adequate security, risk, “second law” under “Courtney’s laws”.)
Add-On Security
the retrofitting of protection mechanisms, implemented by hardware or software, in an information system after the system has become operational
Baked in Security
The inclusion of security mechanisms in an information system beginning at an early point in the systems life cycle, e.e during the design phase or at least early in the implementation phase
Common Criteria for Information Technology Security
A standard for evaluating IT products and systems. it states requirements for security functions and for assurance measures.
compartmented security mode
A mode of system operation wherein all users having access to the system have the necessary security clearance for the single, hierarchical classification level of all data handled by the system, but some users do not have the clearance for a non-hierarchical category of some data handled by the system
computer security [COMPUSEC]
Measures to implement and assure security services in a computer system, particularly those that assure access control service
data confidentiality
The property that data is not disclosed to system entities unless they have been authorized to know the data (see: Belle-LaPadula model)
data integrity
The property that data has not been changed, destroyed or lost in an unauthorized or accidental manner
defense in depth
The siting of mutually supporting defense positions designed to absorb and progressively weaken attack, prevent initial observations of the whole position by the enemy, and [enable] the commander to maneuver the reserve
discretionary access control
An access control service that (a) enforces a security policy based on the identity of system entities and the authorizations associated with the identities and
(b) incorporates a concept of ownership in which access rights for a system resource may be granted and revoked by the entity that owns the resource
economy of mechanism
the principe that a security mechanism should be designed to be as simple as possible, so that [a] the mechanism can be correctly implemented and
[b] it can be verified that the operation of the mechanism enforces the system’s security policy
FIPS
he Federal Information Processing Standards Publication (FIPSPUB) series issued by NIST under the provisions of Section 111(d) of the Federal Property and Administrative Services Act of 1949 as amended by the Computer Security Act of 1987 (Public Law 100-235)as technical guidelines for U.S. Government procurements of information processing system equipment and services. (See:
HIPPA
Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information.
Mission critical
a condition of a system service or other system resource such that a denial of access to, or lack of availability of, the resource would jeopardize a systems user’s ability to perform a primary mission function or would result in other serious consequences
mission essential
U.S. DoD/ Refers to materiel that is authorized and available to combat, combat support, combat service support, and combat readiness training forces to accomplish their assigned missions. [JP1] (Compare: mission critical.)