Vocab Week 3 Flashcards
Clean System
A computer system in which the OS and application system software and files have been freshly installed from trusted software distribution media
Configuration Control
Process of regulating changes to hardware, firmware, software, and documentation throughout the development and operational life of a system
Daemon
Computer program that is not invoked explicitly but waits until a specified condition occurs, and then runs with o associated user, usually for an administrative purpose
Evaluation Assurance Level
Predefined package of assurance components hat represents a point on the common criteria scale for rating confidence in the security of information technology products and systems.
handshake
Protocol dialogue between two systems for identifying ad authenticating themselves
Harden
To protect a system by configuring it to operate in a way that eliminates of mitigates known variables
Legacy System
System in operation hat is in operation but ill not be improved or expanded while a new system is being developed to supersede it
Misuse
The intentional use of system resources for other than authorized purposes.
POSIX
Portable Operating System Interface for Computer Environments. Defines and OS interface and environment to support application portability at the source code level.
Post Office Protocol, Version 3
An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve messages that the serves has received and is holding for the client
Repudiation
Denial by a system entity that was involved in an association (especially a communication association that transfers data) of having participated in the relationship.
A type of threat action whereby an entity deceives another by falsely denying responsibility for an act
Root
A CA [certification authority] that is directly trusted by an end entity
Secure Shell
Protocol for remote login and other secure network services
Sandbox
Restricted controlled execution environment that prevents potentially malicious software, such as mobile code from accessing any system resources except those for which the software is authorized.
Session
Computer usage. A continuous period of time, usually initiated by a login, during which a user accesses a computer system