Term
|
Definition
| Any device or process that is used to reduce risk. |
|
|
Term
|
Definition
| Level of security controls. The processes for developing and ensuring policies and procedures are carried out. Decide what users may do, must do, or cannot do. |
|
|
Term
|
Definition
| Level of security controls. Controls that are carried out or managed by devices. |
|
|
Term
|
Definition
| General use term for subtypes of security controls. |
|
|
Term
|
Definition
| Activity phase control. Control subtype that attempts to discourage security violations before they occur. |
|
|
Term
|
Definition
| Activity phase control. Control subtype that works to prevent a threat from contacting a vulnerability. |
|
|
Term
|
Definition
| Activity phase control. Control subtype designed to identify threats that have reached the system. |
|
|
Term
|
Definition
| Activity phase control. Control subtype that provides an alternative to normal controls that cannot be used. |
|
|
Term
|
Definition
| Activity phase control. Control subtype that is intended to mitigate damage caused by a security incident that has already occurred. |
|
|
Term
| External Perimeter Defenses |
|
Definition
| Physical security defenses designed to restrict access to the areas where equipment is located. Consists of defensive measures used to prevent entering or climbing over barriers around a restricted area, or to detect unauthorized persons within a restricted area. |
|
|
Term
|
Definition
| Physical security defense designed to block or direct the passage of traffic. Generally this method can be circumvented by climbing over it. |
|
|
Term
| CCTV (Closed Circuit Television) |
|
Definition
| Physical security defense that consists of a network of video surveillance equipment that uses video cameras to transmit a signal to a specific set of receivers. |
|
|
Term
|
Definition
| Physical security defense used to determine an object's change in position in relation to its surroundings. |
|
|
Term
|
Definition
| Intelligent combination lock that uses buttons that must be pressed in the proper sequence in order to open the door. The combination can be programmed to change at specified times or as necessary. |
|
|
Term
|
Definition
| A physical object used to identify a user in order to gain access to a restricted area. An ID badge is the most common type. |
|
|
Term
|
Definition
| Device that detects a signal emitted from a physical token within a certain range. |
|
|
Term
| RFID (Radio Frequency Identification) |
|
Definition
| Tag affixed to a physical token that can be read by a scanner or proximity reader via radio waves. |
|
|
Term
|
Definition
| Record of individuals who have permission to enter a secure area. |
|
|
Term
|
Definition
| Device designed to separate a nonsecured area from a secured area. It consists of device monitors and controls two interlocking doors to a vestibule (small room) that only allows one door to be opened at a time. |
|
|
Term
| PDS (Protected Distribution System) |
|
Definition
| A system of cable conduits (hollow tubes that carry network cables) used to protect classified information that is transmitted between two secure areas. |
|
|
Term
|
Definition
| Physical security that involves protecting the hardware of the host system. |
|
|
Term
|
Definition
| Lock inserted into the security slot of a portable device used to secure the device to furniture with a steel cable. |
|
|
Term
|
Definition
| Locked box used to secure a portable device such as a laptop. May contain other functions such as a charging station. |
|
|
Term
|
Definition
| Document that clearly defines the defense mechanisms an organization will employ in order to keep information secure. |
|
|
Term
|
Definition
| Standard against which systems can be evaluated and audited for their security posture. This is often done via a specialized software for this purpose. |
|
|
Term
|
Definition
| The level of security that a system has. |
|
|
Term
|
Definition
| A collection of security configuration settings. |
|
|
Term
- Protect the physical device - Secure the OS - Use antimalware software |
|
Definition
| Three steps to secure the host? |
|
|
Term
- Develop security policy - Perform baselining - Configure OS security settings - Deploy & manage security settings - Patch management |
|
Definition
| Five steps to enhance the security of an OS? |
|
|
Term
|
Definition
| Universal, publicly released software security update that is intended to repair a known vulnerability. |
|
|
Term
|
Definition
| Software update that addresses a security issue specific to certain customers. |
|
|
Term
|
Definition
| Cumulative software update package consisting of patches, hotfixes, and other features. |
|
|
Term
|
Definition
| The implementation of security measures into the design and coding of an OS. |
|
|
Term
|
Definition
| An OS that has been designed with the implementation of OS hardening. |
|
|
Term
|
Definition
| Antivirus software scanning method used to match known virus patterns against potentially infected files. |
|
|
Term
| Dynamic Heuristic Detection |
|
Definition
| Antivirus software scanning method that uses a variety of techniques to detect general characteristics of viruses, rather than attempting to make a match against known specific viruses. |
|
|
Term
|
Definition
| Antispam filtering technique that detects spam by analyzing all words in email messages, and marks emails as spam that have a high amount of words that are most likely to be seen in a spam email. |
|
|
Term
|
Definition
| Also known as a firewall, or software that is designed to prevent malicious network packets from entering a system by blocking network ports or applications. |
|
|
Term
|
Definition
| Computer systems with a minimal OS and specific, dedicated function such as printers or ATMs. |
|
|
Term
|
Definition
| Large computer system with significant processing capabilities. |
|
|
Term
| SCADA (Supervisory Control And Data Acquisition) |
|
Definition
| Large scale industrial control systems used in environments such as military, manufacturing, and power plants. |
|
|
Term
|
Definition
| Software testing technique used to deliberately provide invalid, unexpected, or random data in order to detect errors. |
|
|
Term
| XSRF (Cross-Site Request Forgery) |
|
Definition
| Attack that uses a user's web browser settings to impersonate the user. |
|
|
Term
| DLP (Data Loss Prevention) |
|
Definition
| A system of security tools used to recognize and identify critical data. It monitors who is using the data and how it is being accessed in order to protect the data from unauthorized users. |
|
|
Term
|
Definition
| Data actions being performed by endpoint devices (ex. creating/accessing an offline document) |
|
|
Term
|
Definition
| Data actions that are transmitted across a network (ex. sending an email) |
|
|
Term
|
Definition
| Data that is stored on electronic media. |
|
|
Term
|
Definition
| Transforming information into a secure form so that unauthorized persons cannot access it. |
|
|
Term
|
Definition
| Hiding the existence of data within a different data type. |
|
|
Term
|
Definition
| Data that is used to describe the content or structure of a file. |
|
|
Term
|
Definition
| The process of converting plaintext into ciphertext. |
|
|
Term
|
Definition
| The process of converting ciphertext into plaintext. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Cleartext data that is to be encrypted, or that has resulted from being decrypted. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Procedures based on a mathematical formula that encrypt and decrypt data. |
|
|
Term
- Confidentiality (ensuring only authorized parties view it) - Integrity (ensuring the data is correct and has not been altered) - Availability (ensuring that authorized users are able to access the data) - Authentication (verifying the identity of a user) - Non-repudiation (verifying whether an authorized user, rather than an imposter, performed a specific action) |
|
Definition
| The five basic protections of cryptography? |
|
|
Term
|
Definition
| The process of verifying whether a user performed an action. |
|
|
Term
| Stream Cipher or Substitution Cipher |
|
Definition
| A cipher that replaces one character with one or more different characters. |
|
|
Term
|
Definition
| A cipher that manipulates an entire block of plaintext at once. |
|
|
Term
|
Definition
| A cipher that changes a string of any length into a different string of any length. |
|
|
Term
|
Definition
| A one-way algorithm that creates a unique digital fingerprint for a set of data/The process of creating that fingerprint. |
|
|
Term
|
Definition
| A unique digital fingerprint of a set of data that was created from the process of hashing. |
|
|
Term
|
Definition
| An algorithm that cannot be reversed. |
|
|
Term
| Hashed Message Authentication Code |
|
Definition
| A hash function that uses a shared secret key, sent along with a message, that is unique to the sender. |
|
|
Term
|
Definition
| The most recent message digest version. It produces a message padded to 512 bits that is expressed as a 32-bit hexadecimal number. |
|
|
Term
| SHA (Secure Hash Algorithm) |
|
Definition
| A very secure hash with four versions. It consists of a 160-bit digest and a 40 digit hexadecimal number, and uses a sponge function. |
|
|
Term
|
Definition
| A newer, unpatented cipher consisting of a 512-bit digest. |
|
|
Term
| RIPEMD (Research and Development in Advanced Communications Technologies Integrity Primitives Evaluation Message Digest) |
|
Definition
| Message digest consisting of two parallel chains of computation that combine their result at the end. It has different versions that vary in length. |
|
|
Term
| Symmetric Cryptographic Algorithms or Private Key Cryptography |
|
Definition
| Algorithms that use the same key to encrypt and decrypt data. |
|
|
Term
| DES (Data Encryption Standard) |
|
Definition
| An older symmetric cryptography algorithm that uses a block cipher with a 56-bit key size. This original standard is no longer considered secure and newer, slightly more secure versions exist. |
|
|
Term
| AES (Advanced Encryption Standard) |
|
Definition
| A symmetric cryptography algorithm that uses a block cipher with a key size of either 128, 192, or 256 bits depending on the version. It is considered very secure as there have been no successful attacks against it. |
|
|
Term
|
Definition
| A block cipher algorithm that runs effectively on 32-bit computers/A more secure version of this algorithm, which can have a key length from 32 to 448 bits |
|
|
Term
|
Definition
| The only known cryptography method that cannot be broken mathematically. It consists of a sequence of random letters (a pad) that is used as a random key and combined with plaintext. It does not require the use of a computer and is intended to be destroyed after use. |
|
|
Term
| Asymmetric Cryptographic Algorithms or Public Key Cryptography |
|
Definition
| Cryptography method that uses two mathematically related keys: a public key, and a private key. |
|
|
Term
|
Definition
| An electronic verification of the sender. |
|
|
Term
| RSA (Rivest-Shamir-Adleman) |
|
Definition
| The most common asymmetric cryptography algorithm, which is based around prime numbers. |
|
|
Term
| ECC (Ecliptic Curve Cryptography) |
|
Definition
| An asymmetric cryptography algorithm method which is based around sloping curves. |
|
|
Term
|
Definition
| A lattice-based asymmetric cryptographic algorithm. |
|
|
Term
|
Definition
| A cryptography method that exploits the properties of microscopic objects. |
|
|
Term
|
Definition
| The process of sending and receiving public or private keys. |
|
|
Term
|
Definition
| A key exchange method that takes place outside of normal communication channels. |
|
|
Term
|
Definition
| A key exchange method that takes place within normal communication channels. These methods include: DH, DHE, ECDH, and Perfect Forward Secrecy. |
|
|
Term
|
Definition
| An in-band key exchange method which generates random public keys which are different for each session and thus cannot reveal the contents of more than one message. |
|
|
Term
| PGP (Pretty Good Privacy) |
|
Definition
| A common cryptography system for files on Windows systems. |
|
|
Term
|
Definition
| A common open-source cryptography system for files on Windows, Linux, and UNIX systems. |
|
|
Term
|
Definition
| Cryptography method that applies to an entire hard disk, such as Bitlocker. |
|
|
Term
| TPM (Trusted Platform Module) |
|
Definition
| Cryptographic services provided via a dedicated chip on the motherboard. |
|
|
Term
| HSM (Hardware Security Module) |
|
Definition
| A physical hardware device that provides cryptographic services and is often a LAN based appliance intended to provide these services to multiple devices. |
|
|