Shared Flashcard Set

Details

Final Exam
CIS 110 3rd exam
41
Computer Science
Undergraduate 1
06/14/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Acceptable Use Policy
Definition
A set of rules applied by the owner/manager of a network, website or large computer system that restricts the ways in which the network site or system may be used.
Term
Asymmetric Encryption
Definition
Keys come in pairs. What one key encrypts, only the other can decrypt.
Term
Authenticity
Definition
The steps that ensure that the individual is who they claim to be.
Term
Availability
Definition
Security actions that ensure that data is accessible to authorized users.
Term
bridge of trust model
Definition
A trust model with on CA that acts as a facilitator to interconnect to all other CAs.
Term
Certificate Authority
Definition
A trusted third-party agency that is responsible for issuing digital certificates.
Term
Chain of Custody
Definition
A process of documentation that shows that evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence.
Term
Cleartext
Definition
Unecrypted Data
Term
Col Site
Definition
A remote site that provides office space; the customer must provide and install all the equipment needed to continue operations.
Term
Computer Forensics
Definition
Using Technology to search for computer evidence of a crime.
Term
Confidentiality
Definition
Security actions that ensure only authorized parties can view information.
Term
Cryptolography
Definition
The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it.
Term
Decryption
Definition
The process of changing ciphertext into plain text
Term
Digital Certificate
Definition
A technology used to associate a user's identity to a public key, in which the user's public key is "digitally signed" by a trusted third party.
Term
Disaster Recovery
Definition
The procedures and processes for restoring an orginzation's IT operations following a disaster.
Term
Distributed Trust
Definition
A trus model that has multiple CAs that sighn digital certificates.
Term
EFS
Definition
The proportion of an asset's value that is likely to be destroyed by a particular risk (expressed as a percentage)
Term
Faraday Cage
Definition
A metallic enclosure that prevents the entry or escape of a electromagnetic field.
Term
Hashing
Definition
THe process for creating a unique digital fingerprint signature for a set of data.
Term
Hierarchical Trus Model
Definition
A trust model that has a single hierarchy with on master CA
Term
Hot Site
Definition
A duplicate of the production site that has all the euipment needed for an organization to continue running, includeing office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
Term
Integrity
Definition
Security actions that ensure that the information is correct and no unauthorized person or malicious software have altered the data.
Term
IPSec
Definition
A set of protocols developed to support the secure exchange of packets
Term
Key recovery agent (KRA)
Definition
A highly trusted person responsible for recovering lost or damaged digital certificates.
Term
Nonrepudiation
Definition
The process of proving that a user performed an action
Term
Penetration Testing
Definition
A test by an outsider to actually exploit any weaknesses in systes that are vulnerable.
Term
Privacy Policy
Definition
A policy that outlines how the orginization uses personal information it collects.
Term
Private Key
Definition
An asymmetric encryption key that does have to be protected
Term
Public Key
Definition
An asymmetric encryption key that does not have to be protected
Term
Public Key Infastructure
Definition
A framework for all of the entities involved in digital certificates for digital certificate managment.
Term
Registration Authority
Definition
A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.
Term
Risk
Definition
The liklihood that a threat agent will exploit the vulnerability
Term
Security Policy
Definition
A document or seris of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.
Term
Social Engineering
Definition
A means of gathering information for an attach by relying on the weaknesses of individuals.
Term
Social Networking
Definition
Grouping individuals and organizations into clusters or groups based on a like affilation.
Term
Steganography
Definition
Hiding the existence of data within a text, audio, image, or video file.
Term
Third-Party Trust
Definition
A trust model in which two individuals trust each other because each individually trusts a third party.
Term
Threat
Definition
A type of action that has the potential to cause harm.
Term
Trusted Platform Module
Definition
A chip on the motherboard of the computer that provides cryptographic services
Term
Van Eck Phreaking
Definition
Process of eavesdropping on the contents of a CRT or LCD display by detecting its electromagnetic emissions.
Term
Warm Site
Definition
A remote site that contains computer equipment but does not have active internet or telecommunication facilities, and does not have backups of data.
Supporting users have an ad free experience!