Term
|
Definition
| The concealment of information or resources. |
|
|
Term
|
Definition
| Controls access to the unscrambled data, but also requires protection |
|
|
Term
|
Definition
| The trustworthiness of data or resources, and it's usually phrased in terms of preventing improper or unauthorized change. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Seek to maintain integrity of the data by blocking any unauthorized attempts to change the data or any attempts to change the data in unauthorized ways. |
|
|
Term
|
Definition
| Simply report that the data's integrity is no longer trustworthy. |
|
|
Term
|
Definition
| The ability to use the info or resource desired. |
|
|
Term
| Denial of service attacks |
|
Definition
| Attempts to block availability. Difficult to detect. |
|
|
Term
|
Definition
| A potential violation of security . |
|
|
Term
|
Definition
| Unauthorized access to information. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Interruption or prevention of correct operation |
|
|
Term
|
Definition
| Unauthorized control of some part of the system. |
|
|
Term
|
Definition
| Unauthorized interception of information. Type of disclosure. |
|
|
Term
| Wiretapping/passive wiretapping |
|
Definition
| A form of snooping in which a network is monitored. |
|
|
Term
|
Definition
| Unauthorized change of information. Can be deception, disruption or usurpation. |
|
|
Term
| Active wiretapping(not snooping) |
|
Definition
| A form of modification in which data moving across a network is altered. Ex: man-in-the-middle attack. |
|
|
Term
|
Definition
| An impersonation of one entity by another. Both deception and usurpation. |
|
|
Term
|
Definition
| when one entity authorizes another (2nd) entity to perform functions on its behalf. |
|
|
Term
|
Definition
| A false denial that an entity sent(or created) something. Type of deception. |
|
|
Term
|
Definition
| A false denial that an entity received some information or message. Type of deception. |
|
|
Term
|
Definition
| A long-term of inhibition of service. Type of usurpation with elements of deception. |
|
|
Term
|
Definition
| A statement of what is, and what is not, allowed. |
|
|
Term
|
Definition
| A method, tool, or procedure for enforcing a security policy. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Indicate the effectiveness of preventative measures, along with notifying user when preventative measures fail. |
|
|
Term
|
Definition
| A basis for determining "how much" to trust a system. |
|
|
Term
|
Definition
| A statement of the desired functioning of the system |
|
|
Term
|
Definition
| Translates a system's specifications into components that will implement them. |
|
|
Term
|
Definition
| Creates a system that satisfies the design. |
|
|
Term
|
Definition
| It's legal to have passwords be social security #s, but unacceptable. |
|
|
Term
|
Definition
| People who have some motive to attack an organization and are not authorized to use that organization's systems. |
|
|
Term
|
Definition
| Those that are authorized to use the computers. |
|
|
Term
|
Definition
| A statement that partitions the states of the system into a set of authorized, or secure, states and a set of unauthorized, or non-secure, states. |
|
|
Term
|
Definition
| A system that starts in an authorized state and cannot enter an unauthorized state. |
|
|
Term
|
Definition
| Occurs when a system enters an unauthorized state. |
|
|
Term
|
Definition
| If X is a set of entities and I is some info, then I has the property of confidentiality with respect to X if no member of X can obtain info about I. |
|
|
Term
|
Definition
| The illicit transmission of information without leakage of rights. |
|
|
Term
|
Definition
| No one single entity alone can complete a transaction. Takes multiple persons. Included in the integrity policy. |
|
|
Term
|
Definition
| An entity or procedure that enforces some part of the security policy. |
|
|
Term
|
Definition
| A model that represents a particular policy or set of policies. |
|
|
Term
| Military security policy/gov't security policy |
|
Definition
| A security policy developed primarily to provide confidentiality. |
|
|
Term
| Commercial security policy |
|
Definition
| A security policy developed primarily to provide integrity. |
|
|
Term
| Transaction-oriented integrity security policies |
|
Definition
| Integrity policies that use the notion of a transaction like database specifications, and require that any actions taken leave the database in a consistent state. |
|
|
Term
|
Definition
| A security policy dealing only with confidentiality. |
|
|
Term
|
Definition
| A security policy dealing only with integrity |
|
|
Term
| Discretionary access control(DAC)/Identity-based access control(IBAC) |
|
Definition
| The mechanism that if an individual user can set an access control mechanism to allow or deny access to an object. |
|
|
Term
| Mandatory access control(MAC)/Rule-based access control |
|
Definition
| The control as when a system mechanism controls access to an object and an individual user cannot alter that access. |
|
|
Term
| Originator controlled access control |
|
Definition
| Bases access on the creator of an object(or info it contains). |
|
|
Term
|
Definition
| A language for representing a security policy |
|
|
Term
|
Definition
| A set of objects to which a particular access constraint may be applied. |
|
|
Term
|
Definition
| The set of ways in which an operation can be invoked. |
|
|
Term
|
Definition
| Occurs when a subject "s" creates an instance of a class "c", and is written "s-|c". |
|
|
Term
|
Definition
| Occurs when a subject S1 executes an object S2(which becomes a subject, because it's active) and is written "S1|->S2". |
|
|
Term
|
Definition
| Controls access between d_user and d_admin. |
|
|
Term
|
Definition
| The art and science of concealing meaning. |
|
|
Term
|
Definition
| Added to each security classification to describe the kinds of information. |
|
|
Term
|
Definition
| A&A database stores explicit labels as parts of the object's attributes. |
|
|
Term
|
Definition
| A set of labels expressed by a lower bound and an upper bound. |
|
|
Term
|
Definition
| A request and decision that moves that system from one state to another. |
|
|
Term
|
Definition
| If a rule is ssc-preserving, *-property-preserving, and ds-property-preserving. |
|
|
Term
|
Definition
| States that subjects and objects may not change their security levels once they have been instantiated. |
|
|
Term
|
Definition
| Subjects that will remove all sensitive info from the HIGH object before its classification is charged to LOW. |
|
|
Term
| Principle of strong tranquility |
|
Definition
| States that security levels do not change during the lifetime of the system. |
|
|
Term
| Principle of weak tranquility |
|
Definition
| States that security levels don't change in a way that violates that rules of a given security policy. |
|
|
Term
|
Definition
| An integer "n">1 or 0 that has only 1 and itself as divisors. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Marker that uniquely identifies a file. |
|
|
Term
|
Definition
| Describe the locations of files with respect to the root of the UNIX file hierarchy. |
|
|
Term
|
Definition
| Describe the locations of files with respect to the director, in which the current process is executing. |
|
|
Term
| Uniform Resource Locator(URL) |
|
Definition
| Identifies an object by specifying its location and the protocol needed to access it. |
|
|
Term
|
Definition
| A identity tied to a single entity. |
|
|
Term
|
Definition
| Programs that create processes with the effective UID being that of the owner of the program rather than that of the user executing the program. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A type of group that ties membership to a group when they log in |
|
|
Term
|
Definition
| Describes the unique entities required to identify the unique entity to whom the certificate is to be issued. |
|
|
Term
|
Definition
| Describes the principals to whom the CA will issue certificates. |
|
|
Term
| Policy certification authorities(PCAs) |
|
Definition
| Declared by the Internet Policy Registration Authority(IPAA) that all other CAs are subordinate to these |
|
|
Term
|
Definition
| A program that simulates the hardware of a(possibly abstract) computer system. |
|
|
Term
|
Definition
| A special operating system for virtual machines. |
|
|
Term
|
Definition
| An environment in which the actions of a process are restricted according to a security policy. |
|
|
Term
|
Definition
| Uses an attribute of the shared resource. |
|
|
Term
|
Definition
| Uses a temporal or ordering relationship among accesses to a shared resource. |
|
|
Term
|
Definition
| A covert channel that uses a resource available to the sender and receiver only. |
|
|
Term
|
Definition
| A covert channel that uses a resource available to subjects other than the sender and receiver, as well as to the sender and receiver. |
|
|
Term
|
Definition
| Defines and controls threats and vulnerabilities as well as implements risk reduction. |
|
|
Term
|
Definition
| Determines what the risks are |
|
|
Term
|
Definition
| Evaluating alternative for mitigating risk |
|
|
Term
|
Definition
| Presenting this material in an understandable way to decision makers and/or users. |
|
|
Term
|
Definition
| Set of circumstances that has the potential to cause harm/loss. They are also attacks against key security services, and can trigger vulnerabilities. |
|
|
Term
|
Definition
| Flaw or weakness in a system that can be exploited to violate system integrity |
|
|
Term
| Baseline Approach to Risk Analysis |
|
Definition
| Low overhead for analysis, but could result in practices not appropriate for your organization. |
|
|
Term
|
Definition
| Bring an expert to examine, but not follow format process |
|
|
Term
|
Definition
| Follow formal process with high overhead but catches most vulnerabilities. Most often used. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Opponent whose goal is to break cryptosystem. |
|
|
Term
|
Definition
| 1-gram frequencies that match English frequencies, but other n-gram frequencies do not...Rearranged to form n-grams with highest frequencies. |
|
|
Term
|
Definition
| Change characters in plaintext to produce ciphertext(i.e. Caesar shift). |
|
|
Term
|
Definition
| Where a change of one input or key bit results in changing approximately half of the output bits. It is a desirable property of an encryption algorithm, and DES exhibits strong avalanche. |
|
|
Term
|
Definition
| Structured to enable use of some S-box and P-box for encryption and decryption. Changes only the key schedule. |
|
|
Term
|
Definition
| Created in 200 by Rijndael, it has a 20-30 year lifespan, and uses iterative rather than Feistel cipher. It also has 9, 11, or 13 rounds in which state undergoes byte substitution, shift rows, mix columns, and adding round keys. |
|
|
Term
|
Definition
| A finite set of elements "S", with operations + and * that satisfy certain properties: commutative and distributive laws. |
|
|
Term
|
Definition
| For any prime "p", there's a unique field with p^n elements. We are interested in GF(2^theta). |
|
|
Term
|
Definition
| If one block of ciphertext is altered, the error propagates for at most two blocks. |
|
|
Term
|
Definition
| Period 10^10, variable length key from 1 to 256, byte based operations, and very efficient. |
|
|
Term
|
Definition
| Mathematical function to generate a set of "k" bits from a set of "n" bits(where k<=n). |
|
|
Term
|
Definition
| Probability that 2 people share the same birthday. |
|
|
Term
|
Definition
| Keyless crypto hashes. 128 bits, only good for 2^64 bit outcome. |
|
|
Term
|
Definition
| Keyless crypto hashes containing 160 bits put forth by NIST and broken by Chinese researchers. |
|
|
Term
|
Definition
| Crypto hash and proof of message integrity. Relies on keys to ensure integrity. |
|
|
Term
|
Definition
| Make keyed cryptographic checksums from keyless cryptographic checksums. |
|
|