Vocab Week 2 Flashcards

1
Q

Assurance Level

A

a rank on a hierarchical scale that judges the confidence someone can have that a TOE [target of evaluation] adequately fulfills stated security reqs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adversary

A

an entity that attacks a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Coordinated Universal Time

A

UTC is derived from international atomic time [TAI] by adding a number of leap seconds. The international bureau of weights and measures computes TAI once each month by averaging data from many labs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Correctness proof

A

mathematical proof of consistency between a specification for system security and the implementation of that specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

corruption

A

A type of threat action that undesirably alters system operation by adversely modifying system functions or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

information system

A

An organized assembly of computing and communication resources and procedures – i.e. equipment and services together with their supporting infrastructure, facilities and personnel – that create, collect, record, process, store, transport, retrieve, display, disseminate, control or dispose of information to accomplish a specified set of functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

mutual suspicion

A

the state the exists between two interacting systems entities in which neither entity can trust the other to function correctly with regard to some security requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

National Security System

A

Any gov- operated information system for which the function, operation, or use

a) involves intelligence activities
b) involves cryptologic activities related to national security
c) involves command and control of military forces
d) involves equipment that is an integral part of a weapon on weapon system
e) is critical to the direct fulfillment of military or intelligence missions and does not include a system that is to used or routine administrate and business applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Penetration Test

A

A system test often part of system certification, in which evaluators attempt to circumvent the security features of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

policy

A

Plan or course of action that is stated for a system or organization and is intended to affect and direct the decisions and deeds of that entity’s component or members
a definite goal, course, or method of action to guide and determine present and future decisions that is implemented or executed within a particular context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

privacy

A

The right of an entity acting in its own behalf to determine the degree to which it will interact with its environment including the degree to which the entity is willing to share its personal information with others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reference monitor

A

an access control concept that refers to an abstract machine that mediates all accesses to objects by subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

security by obscurity

A

Attempting to maintain or increase security of a system by keeping secret the design or construction of a security mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

security controls

A

The management, operational and technical controls [safeguards, or countermeasures] prescribed for an information system which, taken together, satisfy the specified security requirements and adequately protect the confidentiality, integrity and availability of the stem and its information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

security event

A

An occurrence in a system that is relevant to the security of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

security perimeter

A

a physical of logical boundary that is defined for a domain or enclave and within which a particular security policy of security architecture applies

17
Q

security target

A

A set of security requirements and specifications to be used as the basis for evaluation of an identified TOE [target of evaluation]

18
Q

separation of duties

A

The practice of dividing the steps in a system process among different individual entities so as to prevent acting alone from being able to subvert the process

19
Q

strong

A

used to describe a cryptographic algorithm that would require a large amount of computational power to defeat it

20
Q

unauthorized disclosure

A

a circumstance or event whereby an entity gains access to information for which the entity is not authorized