Vocab Week 3 Flashcards

1
Q

Clean System

A

A computer system in which the OS and application system software and files have been freshly installed from trusted software distribution media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Configuration Control

A

Process of regulating changes to hardware, firmware, software, and documentation throughout the development and operational life of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Daemon

A

Computer program that is not invoked explicitly but waits until a specified condition occurs, and then runs with o associated user, usually for an administrative purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Evaluation Assurance Level

A

Predefined package of assurance components hat represents a point on the common criteria scale for rating confidence in the security of information technology products and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

handshake

A

Protocol dialogue between two systems for identifying ad authenticating themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Harden

A

To protect a system by configuring it to operate in a way that eliminates of mitigates known variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Legacy System

A

System in operation hat is in operation but ill not be improved or expanded while a new system is being developed to supersede it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Misuse

A

The intentional use of system resources for other than authorized purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

POSIX

A

Portable Operating System Interface for Computer Environments. Defines and OS interface and environment to support application portability at the source code level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Post Office Protocol, Version 3

A

An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve messages that the serves has received and is holding for the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Repudiation

A

Denial by a system entity that was involved in an association (especially a communication association that transfers data) of having participated in the relationship.

A type of threat action whereby an entity deceives another by falsely denying responsibility for an act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Root

A

A CA [certification authority] that is directly trusted by an end entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure Shell

A

Protocol for remote login and other secure network services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sandbox

A

Restricted controlled execution environment that prevents potentially malicious software, such as mobile code from accessing any system resources except those for which the software is authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Session

A

Computer usage. A continuous period of time, usually initiated by a login, during which a user accesses a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

System Integrity

A

An attribute of quality “that a system has when it can perform its intended function in a unimpaired manner, free from deliberate or inadvertent unauthorized manipulation

17
Q

System User

A

a system entity that consumes a product or service provided by the system, or that accesses and employs system resources to produce a product or service of the system

18
Q

Trust

A

A feeling of certainty either:

a) the system won’t fail
b) system meets specs

19
Q

Trust Level

A

A characterization of standard of security protection to be met by an information system

20
Q

Trusted Computer System Evaluation Criteria

A

Standard for evaluation the security provided by OS. Known as the Orange Book because of the color of its cover

21
Q

Trusted Computing Base

A

The totality of protection mechanisms within a computer system, including hardware, firmware and software, the combination of which is responsible for enforcing a security policy.

22
Q

Trustworthy Systems

A

System that is not only trusted but also warrants that tryst because the systems behavior can be validated in some convincing way such as through formal analysis or code review

23
Q

Usurpation

A

and event that results in control of the system services or function by an unauthorized entity. This type of threat consequence can be caused by the following types of threat actions: misappropriation, misuse.

24
Q

Zombie

A

Internet host computer that has been surreptitiously penetrated by an intruder that installed malicious daemon software to case the host to operate as an accomplice in attacking other hosts, particularly in distributed attacks that attempt denial of service though flooding