Weaknesses 3-21 Flashcards
Piggybacking can best be prevented by which physical control?
Mantrap
An audit trail not only reveals the who, what, where, and how for logged activity–but also what?
Separation of duties
Why is a password generator a less effective security control than others such as using dictionary attack tools or just hiding cleartext?
Because they often cause users to write their passwords down, which creates a new vulnerability
A collection of data from different sources that is targeted at one group or for a specific objective is called what?
Datamart
What important variable is used when evaluating the effectiveness of biometric systems?
Crossover Error Rate (CER)
What is Crossover Error Rate in biometric systems?
The point at which false acceptance and false rejection rates are equal. Lower CER is higher accuracy.
What type of computer memory improves system performance by acting as a special storage area for information that is retrieved often, especially while an application is in use.
Cache memory
TRUE/FALSE - Database security measures can protect against buffer overflow attacks?
FALSE - Buffer overflows are an application weakness, not a database security weakness
Clark-Wilson model requires users do what?
Use an external program to interface with an application
The external program used in Clark-Wilson models is also referred to as what?
Access Triple
What security service is provided if a sender encrypts data with the receiver’s public key?
Confidentiality
TRUE/FALSE - Message Authentication Code is part of the Kerberos authentication implementation?
False
In a hospital type environment, what role would be responsible for protecting health and personal information?
Chief Privacy Officer
What is a common technique spammers use to hide the origin of their spam email?
Blacklist of companies with wide open mail server relays
In programming, what language type represents binary to the processor?
Machine