vocabularyG2H Flashcards
Gate
A physical access control which is a controlled entry and exit point in a fence.
Gateway
Found in the network layer of the ISO/OSI reference model, this device acts as a translator between networks with different communication protocols.
GISRA
Government Information Security Reform Act is the law set forth by the U.S. government to provide a comprehensive framework for establishing effectiveness of controls. This law calls for increased network security controls and government-wide management of information security risks.
Gramm-Leach-Bliley Act
A law that modifies restrictions that govern exchange of financial information between financial institutions.
Grudge Attack
A type of attack in which the attacker seeks to get revenge on the target, person, or organization. The general purpose is to harm the reputation of the person by destroying or exploiting data.
Guideline
A recommended action or guide in which the user works within standards, but they are not mandatory. It provides details on how to implement standards.
Hacker
A person who is well skilled in a programming language and often considered an expert on the subject. Can be a complimentary or derogatory term.
Hacker
Also referred to as a cracker, a hacker is a person who is well skilled in a programming language and is often considered an expert on the subject. Can be a complimentary or derogatory term.
Hacking
The act of compromising access controls to gain unauthorized access to a system. Once access is gained, the attacker generally launches a data attack.
Hardware
The physical parts of a computer system that can be touched, such as the printer, mouse, and modem.
Hardware Segmentation
A security control architecture that physically isolates different pieces of hardware.
Hash Total
An error-checking value taken from a string of text that will be processed. After processing, the original value and the checked value are compared to determine if the original value has changed in any way.
HDLC
High-level Data Link Control is a protocol for information transfer which is an extension of the SDLC that was adopted by the ISO. It supports both point-to-point and multipoint configurations.
HIPAA
The Health Insurance Portability and Accountability Act is a law that sets forth strict regulations for organizations that process or store personal medical information.
HMAC
Hashes Message Authentication Code is an algorithm used to authenticate digital signatures which uses shared secret keys so it cannot provide nonrepudiation.