vocabularyA Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

2DES

A

The process of performing the DES algorithm two times at every block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3DES

A

Triple DES is a more secure implementation of DES which includes three equally secure versions. Each of the versions changes the way that the iterations are applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Abstraction

A

A protection mechanism technique which is the primary feature of object-oriented programming. Objects look like black boxes in which contents of the black box are not known, but the points of entry and exit are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accountability

A

A security control architecture that includes monitoring and log file analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

An access control list is a list that specifies which subjects can access which objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ActiveX

A

A program or control written by Microsoft that runs in distributed mode on the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Administrative Control

A

A design-based control that dictates policies and procedures and informs of the correct way to operate in a safe, secure manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Administrative Detective Control

A

Policy or rule that detects when something has occurred by using auditing or performance reviews to see the actions that subjects have taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Administrative/Regulatory Law

A

Any regulation that governs specific personal or organization practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AES

A

Advanced Encryption Standard is a symmetric cryptographic algorithm standard which is the officially accepted replacement standard for DES and 3DES. AES allows three key strengths that are dependent upon the key lengths, and three different transformation layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Agent

A

A program or some other process that performs a special service on behalf of another process or principal. An agent works in a different environment from the principal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Aggregation

A

The process of obtaining information of high sensitivity by combining information from lower levels of sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ALE

A

Annual Loss Expectancy is the Single Loss Expectancy times the Annual Rate of Occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Algorithm

A

A sequence of steps that is used to encrypt plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ALU

A

The arithmetic logic unit is the area inside of the CPU which performs arithmetic and logical functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AND

A

A binary math operator used in cryptography that has an input value of either a zero or one. The input values are combined to give the results seen in the table.

17
Q

ANSI

A

The American National Standards Institute is a voluntary organization that works to establish standards with relationship-to-character sets and programming languages.

18
Q

Applet

A

A similar program to an agent, with the exception that it is platform-independent.

19
Q

Application Layer

A

The highest layer of the ISO/OSI reference model that provides services for high-level programs and program-to-program transfer of information.

20
Q

Architecture

A

A design which provides outlines and exact mechanisms of both hardware and software. It can be divided into five different components: input/output, storage, communication, control, and processing.

21
Q

ARCnet

A

Attached Resource Computer Network is one of the earliest LAN technologies that uses a token passing method within a bus topology.

22
Q

ARO

A

Annual Rate of Occurrence is the calculated, annual probability of loss. It is an estimate of the probability a stated threat will be realized.

23
Q

ARP

A

Address Resolution Protocol is a TCP/IP protocol that finds and determines the address of a system on a LAN when only the IP address is known.

24
Q

Asymmetric Algorithm

A

An algorithm containing a public key that is generated and may be given to anyone. The receiver then uses their own private key to decrypt the message.

25
Q

Asynchronized Device

A

A token device which uses a challenge-response approach to generate a password.

26
Q

Authentication

A

A system for validating that the subject or object is really who or what they say or appear to be.

27
Q

Authentication Service

A

The part of the KDC that actually authenticates the subjects and objects.

28
Q

Authorization Creep

A

Accidentially giving a subject access to objects that are not intended for them to have access to.

29
Q

Availability

A

Part of the security triad that ensures the system is available when needed by means such as fault tolerance or performance tuning.