Vocabulary1 Flashcards
availability
ensures that information is available when needed
Coaxial
network cabling that has an inner copper core separated by an insulatro from a metallic braid or shield
live forensics
Live forensics Taking a binary image of physical memory, gathering details about running processes, and gathering network connection data.
CPPT
Continuity Planning Project Team?A team comprised of stakeholders within an organization that focuses on identifying who would need to play a role if a specific emergency event were to occur.
IDL
Interface Definition Language?Used by CORBA objects to communicate.
Constrained user interface
Presents a user with limited controls on information, such as an ATM keypad.
Data owner
A management employee responsible for ensuring that specific data is protected.
circumstantial evidence
evidence that serves to establish the circumstances related to particular points or even other evidence
BCP
business continuity plan: long-term plan to ensure the continuity of business operations
baselining
the process of captureing a point-in-time understanding of the current system security configuration
Database view
The result of a database query.
method
Method The function performed by an object.
Diffusion
The order of the plaintext should be dispersed in the ciphertext.
lumen
Lumen The amount of light one candle creates.
honeypot
Honeypot A system designed to attract attackers.
circuit-level proxy
proxy firewall that operates at layer 5
COM
Component Object Model: locates and connects objects locally
Decryption
Converts a ciphertext into plaintext.
Consistency testing
See Checklist testing.
Artificial Intelligence
science of programming electronic computers to “Think” more intelligently, sometimes mimicking the ability of mammal brains
background check
verification of a persons background and experience; also called pre-employment screening
CIRT
Computer Incident Response Team: team that performs incident handling
DSSS
Direct Sequence Spread Spectrum?Uses the entire wireless band at once.
link state
Link state Routing protocols that factor in additional metrics for determining the best route, including bandwidth.
agile software development
flexible software development model that eveolved as a reaction to rigid software development modes such as the waterfall model
Coupling
OOP concept that connects objects to others; highly coupled objects have low cohesion.
entitlements
Entitlements The permissions granted to a user.
knowledge base
Knowledge base Expert system component that consists of ?if/then? statements.
mesh
Mesh Physical network topology that interconnects network nodes to each other.
bottom-up programming
starts with lo-level technical implementation details and works up to the concept of the completed program
ad hoc mode
802.11 peer-to-peer mode with no central AP
graham-denning model
Graham?Denning model Has three parts: objects, subjects, and rules; it provides a more granular approach for interaction between subjects and objects.
entrapment
Entrapment A legal defense where the defendant claims an agent of law enforcement persuaded the defendant to commit a crime that he or she would otherwise not have committed.
genetic programming
Genetic programming Creating entire software programs (usually in the form of Lisp source code) via Darwinian evolution principles.
authorization
actions an individual can perform on a system
lattice-based access controls
Lattice-based access controls Nondiscretionary access control with defined upper and lower bounds implemented by the system.
Black box software testing
gives the tester no internal details; the software is treated as a black box that receives inputs
Caller ID
identifies the calling phone number; sometimes used as a weak authentication method
FDDI
FDDI Fiber Distributed Data Interface?Legacy LAB technology that uses light.
E3
16 E1s.
fitness function
Fitness function Genetic algorithm concept that assigns a score to an evolved algorithm.
Control unit
CPU component that acts as a traffic cop, sending instructions to the ALU.
EAP-FAST
EAP?Flexible Authentication via Secure Tunneling?Designed by Cisco to replace LEAP.
802.11i
first 802.11 wireless security standard that provides reasonable security
DAD
Disclosure, Alteration, and Destruction?The opposite of confidentiality, integrity, and availability.
entity integrity
Entity integrity Requires that each tuple has a unique primary key that is not null.
bluetooth
802.15 networking, a PAN wireless technology
Depth of field
The area that is in focus.
Binary image
bit-level copy of memory
DAC
Discretionary Access Control?Gives subjects full control of objects they have been given access to, including sharing the objects with other subjects.
bytecode
machine-indecednet interpreted code, used by Java
ARM
asynchronous Response Mode: HDLC mode where secondary nodes may initiate communication with the primary
baseline
uniform ways to implement a safeguard; an administrative control
Data warehouse
A large collection of data.
Database
A structured collection of related data.
full disclosure
Full disclosure The controversial practice of releasing vulnerability details publicly.
combinatorial software testing
black box testing method that seeks to identify and test all unique combinations of software inputs
DCE
Data Circuit-Terminating Equipment?A device that networks DTEs, such as a router.
BGP
Border Gateway Protocol: routing protocol used on the internet
MPLS
MPLS Multiprotocol Label Switching?Provides a way to forward WAN data via labels.
facial scan
Facial scan Biometric control compares a picture of a face to pictures stored in a database.
Impact
The severity of damage, sometimes expressed in dollars (value).
Dictionary attack
Password cracking method that uses a predefined list of words, like a dictionary, running each word through a hash algorithm.
ADSL
Asymmetric Digital Subscriber Line–DSL featuring faster download speeds than upload
COBIT
Control Objectives for Information and Related Technology: a control framework for employing information security governance best practices w/in an org
genetic algorithms
Genetic algorithms Creating computer algorithms via Darwinian evolution principles.
IKE
Internet Key Exchange?Manages the IPsec encryption algorithm.
Diskless workstation
Computer systems that contains CPU, memory, and firmware but no hard drive; type of thin client.
DNS
Domain Name System?A distributed global hierarchical database that translates names to IP addresses, and vice versa.
Copyright
Type of intellectual property that protects the form of expression in artistic, musical, or literary works.
IPv6 autoconfiguration
IPv6 autoconfiguration Autoconfiguration of a unique IPv6 address, omitting the need for static addressing or DHCP.
clipper chip
(failed) 1993 Escrowed Encryption Standard (EES) which used the skipjack algorithm
Direct evidence
Testimony provided by a witness regarding what the witness actually experienced.
Context-dependent access control
Adds additional criteria beyond identification and authentication; the context of the access, such as time.
IGP
Interior Gateway Protocol.
mirroring
Mirroring Complete duplication of data to another disk, used by some levels of RAID.
ARPAnet
predecessor to the Internet
Clearance
determinateino, typically made by a senior security professional, about whether or not a user can be trusted with a specific level of information
fraggle attack
Fraggle attack Smurf attack variation that uses UDP instead of ICMP.
MAC (Access Control)
MAC (access control) Mandatory Access Control?System-enforced access control based on subjects? clearances and objects? labels.
Bell-LaPadula
security model focused on maintaining the confidentiality of objects
Distance vector
Routing protocol that uses a simple metric, such as hop count.
minutiae
Minutiae Specific fingerprint details that include whorls, ridges, bifurcation, and others.
CCM
Capability maturity model: maturity framework for evaluating and improving the software development process
DDL
Data Definition Language?Used to create, modify, and delete tables.
Develop the contingency planning policy statement.
First step of the NIST SP 800?34 contingency planning process.
hebern machines
Hebern machines Class of cryptographic devices known as rotor machines, includes Enigma and SIGABA.
Diffie?Hellman key agreement protocol
Key agreement that allows two parties to securely agree on a symmetric key via a public channel with no prior key exchange.
Contraband check
Seeks to identify objects that are prohibited from entering a secure perimeter (such as an airplane).
hacktivist
Hacktivist Hacker activist; someone who attacks computer systems for political reasons.
authroization creep
occurs when employees not only maintain old access rights but also gain new ones as they move from one division to another within an organization
asymmetric encryption
encryption that uses 2 keys–one to encrypt, one to decrypt
Ethics
Ethics Doing what is morally right.
Integration Testing
Integration testing Testing multiple software components as they are combined into a working system.
HDLC
HDLC High-Level Data Link Control?The successor to SDLC.
Callback
modem-based authentication system
application layer proxy
proxy firewall that operates up to layer 7
lock picking
Lock picking The art of unlocking a lock without a key.
“Bad” blocks/clusters/sectors
good disk blocks marked as bad
buffer overflow
condition where an attacker can insert data beyond the end of a buffer variable
Hierarchical database
Hierarchical database Database that forms a tree.
AES
Advanced Encryption Standard: block cipher using 128- 192- or 256-bit keys to encrypt 129-bit blocks of data
CPU
Central Processing Unit?The ?brains? of the computer, capable of controlling and performing mathematical calculations.
color of law
acting on the authority of law enforcement
administrative Controls
implemented by creating and following organizational policy, procedure, or regulation; also called directive controls
BS-25999
continuity standard by the British Standards Institute
book cipher
cyptographic method that uses whole words from a well-known text such as a dictionary as a one-to-one replacement for plaintext
Conduct the Business impact Analysis (BIA)
second step of NIST SP 800-34 contingency planning process
Defense in depth
Application of multiple safeguards that span multiple domains to protect an asset.
Heresay
Hearsay Second-hand evidence.
Degaussing
Destroying the integrity of the magnetization of the storage media, making the data unrecoverable.
Data link layer
Layer 2 of the OSI model; handles access to the physical layer as well as local area network communication.
IPv6
IPv6 Internet Protocol version 6, the successor to IPv4?IPv6 features far larger address space, simpler routing, and simpler address assignment.
first sale doctrine
First sale doctrine Allows a legitimate purchaser of copyrighted material to sell it to another person.
Inheritance
Inheritance Objects inherit capabilities from their parent class.
BCP/DRP project manager
the key POC for ensuring that a BCP/DRP is not only completed but routinely tested
CHAP
challenge Handshake Authentication Protocol: a more secure network authentication protocol that uses a shared secret
FDE
FDE Full Disk Encryption?Also called whole disk encryption.
hubrid attack
Hybrid attack Password attack that appends, prepends, or changes characters in words from a dictionary.
flash memory
Flash memory A specific type of EEPROM, used for small portable disk drives.
full backup
Full backup An archive of all files.
fiber optic network cable
Fiber optic network cable Uses light to carry information.
footcandle
Footcandle One lumen per square foot.
MTTR
MTTR Mean Time to Repair?Describes how long it will take to recover a failed system.
CSIRT
Computer Security Incident Response Team?The group that is tasked with monitoring, identifying, and responding to security incidents.
Cipher
a cryptographic algorithm
enrollment
Enrollment The process of enrolling with a system (such as a biometric authentication system), creating an account for the first time.
GAN
GAN Global Area Network?A global collection of WANs.
legal liability
Legal liability Liability enforced through civil law.
compartmentalization
technical enforcement of need to know
Cryptography
Science of creating messages whose meaning is hidden.
analog
communication that sends a continuous wave of information
Cohesion
OOP concept that describes an independent object; objects with high cohesion have low coupling
DES
Data Encryption Standard?A symmetric block cipher using a 56-bit key and 64-bit block size.
* Integrity Axiom
* Integrity axiom Biba property that states ?no write up.?
Cryptographic protocol governance
Describes the process of selecting the right cipher and implementation for the right job.
EF
Exposure Factor?The percentage of value an asset lost due to an incident.
CMP
crisis management plan
IDS
Intrusion Detection System?A detective technical control.
ISAKMP
ISAKMP Internet Security Association and Key Management Protocol?Manages the IPsec Security Association process.
confidentiality
seeks to prevent the unauthorized disclosure of information
full knowledge
Full knowledge test A penetration test where the tester is provided with inside information at the start of the test.
Clark-Wilson model
real-world integrity model that protects integrity by having subjects access objects via programs
bridge
layer 2 device that has two ports and connnects network segments together
Interpreted code
Interpreted code Code that is compiled on the fly each time the program is run.
MAN
MAN Metropolitan Area Network?Typically confined to a city, a Zip Code, or a campus or office park.
Biba
security model focused on maintaining the integrity of objects
COOP
Continuity Of Operations Plan?A plan to maintain operations during a disaster.
Diameter
Successor to RADIUS; designed to provide an improved authentication, authorization, and accounting (AAA) framework.
boot sector virus
virus that infects the boot sector of a PC; the virus loads upon system startup
hash function
Hash Function One-way encryption using an algorithm and no key.
ANN
artificial Neural Networks: networks that simulate neural networks found in humans and animals
HIDS
HIDS Host-based intrusion detection system?A detective technical control.
MIC
MIC Message Integrity Check?Integrity protocol used by WPA2.
MODEM
Modem Modulator/demodulator?Takes binary data and modulates it into analog sound that can be carried on phone networks.
collection limitation principle
OECD privacy guideline principle that states that personal data collection should have limits and that data should be obtained in a lawful manner with the individuals knowledge and approval
hot site
Hot site A backup site with all necessary hardware and critical applications data mirrored in real time.
Inference Engine
Inference engine Expert system component that follows the tree formed by the knowledge base and fires a rule when there is a match.
CORBA
Common Object Request Broker Architecture?An open, vendor-neutral networked object broker framework.
monolithic
Monolithic kernel A statically compiled kernel.
EGP
Exterior Gateway Protocol.
Active-active cluster
involves multiple systems, all of which are online and actively processing traffic or data
Differential backup
An archive of any files that have been changed since the last full backup was performed.
keyboard
Keyboard unit The external keyboard.
ABM
Asynchronous Balanced Mode: HDLC combined mode where nodes may asct as primary or secondary initiaint transmissions w/o receiving permission
BRP
business recovery plan: details steps required to restore normal business operations after recovering from a disruptive event. Aka business resumption plan
IRC
IRC Internet Relay Chat?A global network of chat servers and clients.
Bayesian filtering
uses mathematicla formulas to assign probabilities to make decisions such as identifying spam
Covert channe
l Any communication that violates security policy.
DSL
Digital Subscriber Line?Uses existing copper pairs to provide digital service to homes and small offices.
MTU
MTU Maximum Transmission Unit?The maximum PDU size on a network.
802.11b
Wireless standard 11 Mbps 2.4 GHz
MTD
MTD Maximum Tolerable Downtime?The total time a system can be inoperable before an organization is severely impacted.
CIRP
Cypber Incident Response Plan: plan designed to respond to disruptive cyber events, including network-based attacks, worms, computer viruses, Trojan Horses, etc
Dynamic password
Password that changes at regular intervals.
IP
IP Internet Protocol; includes IPv4 and IPv6.
ISO/IEC-27031
ISO/IEC-27031 Draft business continuity guideline that is part of the ISO 27000 series.
MAC (telecommunications)
MAC (telecommunications) Media Access Control?Layer 2 protocol that transfers data to and from the physical layer.
commandments of computer ethics
the computer ethics institute code of ethics
Chinese wall model
model designed to avoid conflicts of interest by prohibiting one person, such as a consultant, from accessinng multiple conflight of Interest categories
Database replication
Mirrors a live database, allowing simultaneous reads and writes to multiple replicated databases by clients.
exfiltration
Exfiltration Policy-violating removal of sensitive data from a secure perimeter.
ECPA
Electronic Communications Privacy Act?Provides search and seizure protection to non-telephony electronic communications.
magnetic stripe card
Magnetic stripe card Passive device that contains no circuits; sometimes called swipe cards because they are swiped through a card reader.
baseband
network with one channel; can only send one signal at a time
ARCNET
attached Resource Computer Network: legacy LAN technology that uses tokens
Chaining
Block cipher mechanism that seeds the previous encrypted block into the next block to be encrypted
Civil Law
law that resolves disputes between individuals or organizations
Internet Layer
Internet layer TCP/IP model layer that aligns with the Layer 3 of the OSI model and describes IP addresses and routing.
CIDR
Classless Inter-Domain Routing: allows for many network sizes beyond the arbitraty stateful network sizes
BCI
business Continuity Institute
MOR
MOR Minimum Operating Requirements?Describes the minimum environmental and connectivity requirements in order to operate computer equipment.
layering
Layering Separates hardware and software functionality into modular tiers.
EOC
EOC Emergency Operations Center?The command post established during or just after an emergency event.
CSU/DSU
Channel Service Unit/Data Service Unit?DCE device.
Agents of law enforcement
private citizens carrying out actions on behalf of law enforcement
high availability cluster
High availability cluster Multiple systems that can be seamlessly leveraged to maintain the availability of the service or application being provided; also called a failover cluster.
COCOM
committee for multilateral export control: munitiions law that was in effect from ‘47-‘94. Designed to control export of criticial technologies (including crypto) to Iron Curtain countries
Executive Session planning
Executive succession planning Determining an organization?s line of succession.
CSRF
Cross-Site Request Forgery?Third-party redirect of static content within the security context of a trusted site.