Term
|
Definition
| A symmetric encryption algorithm that encrypts data by processing each block of data three times, using a different DES key each time. |
|
|
Term
|
Definition
| A family of protocols developed by the IEEE for wireless LAN communication between wireless devices or between wireless devices and a base station. |
|
|
Term
|
Definition
| A fast, secure, but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency. |
|
|
Term
|
Definition
| A wireless communication protocol that improves upon 802.1ln by adding wider channels to increase throughput. |
|
|
Term
|
Definition
| The first specification to be called Wi-Fi,is the least expensive wireless network protocol used to transfer data among computers with wireless network cards, or between a wireless computer or device and a wired LAN. The 802.11 b protocol provides for an 11 Mbps transfer rate in the 2.4 GHz frequency. |
|
|
Term
|
Definition
| A specification for wireless data throughput at the rate of up to 54 Mbps in the 2.4 GHz band that is a potential replacement for 802.11b. |
|
|
Term
|
Definition
| A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a |
|
|
Term
|
Definition
| A standard for encapsulating EAP communications over a LAN or wireless LAN and that provides port-based authentication. |
|
|
Term
|
Definition
| A security concept where a centralized platform verifies object identification, ensures the object is assigned relevant permissions, and then logs these actions to create an audit trail. |
|
|
Term
|
Definition
| An analysis of events that can provide insight into how to improve response processes in the future. |
|
|
Term
|
Definition
| An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted. |
|
|
Term
|
Definition
| The process of determining and assigning privileges to resources, objects, and data. |
|
|
Term
|
Definition
| A security control where user access privileges are audited to ensure they are accurate and adhere to relevant standards and regulations. |
|
|
Term
|
Definition
| A common term used to refer to the processes, functions, and policies used to effectively manage user accounts within an organization. |
|
|
Term
|
Definition
| A document that includes an organization's requirements for account creation, monitoring, and removal. |
|
|
Term
|
Definition
| The process of determining who to hold responsible for a particular activity or event. |
|
|
Term
|
Definition
| The process of tracking and recording system activities and resource access. |
|
|
Term
|
Definition
| On a router, a list that is used to filter network traffic and implement anti-spoofing measures. In a DAC access control scheme, a list that is associated with each object, specifying the subjects that can access the object and their levels of access. |
|
|
Term
|
Definition
| the standards-based directory service from Microsoft that runs on Microsoft Windows servers. |
|
|
Term
|
Definition
| A redundancy mode used by load balancers to router traffic through primary (active) Load balancer is on standby in case of failure of the active device |
|
|
Term
|
Definition
| A redundancy mode used by load balancers to route traffic equally through two load balancers. balancers to route traffic through a primary (active) load balancer while the other (passive) load balancer is on standby in case of failure of the active Device |
|
|
Term
| adaptive chosen ciphertext attack |
|
Definition
| A cryptographic attack where the attacker repeatedly encrypts a selected cipher text message and tries to find the matching plain text. Each subsequent attack is based on the results of the previous attack. |
|
|
Term
| adaptive chosen plaintext attack |
|
Definition
| A cryptographic attack where the attacker repeatedly encrypts a selected plain text message and analyzes the resulting cipher-text to crack the cipher. Each subsequent attack is based on the results of the previous attack. |
|
|
Term
|
Definition
| Software that automatically displays or downloads advertisements when it is used. |
|
|
Term
|
Definition
| A symmetric 128-, 192-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES. |
|
|
Term
|
Definition
| A scheduling approach used by load balancers to route traffic to devices that have already established connections with the client in question |
|
|
Term
|
Definition
| A network device that combines multiple ports into a single link in order enhance redundancy and increase bandwidth. |
|
|
Term
|
Definition
| A software development model that focuses on iterative and incremental development to account for evolving requirements and expectations |
|
|
Term
|
Definition
| An IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks. |
|
|
Term
|
Definition
| A type of network isolation that physically separates a network from all other networks. |
|
|
Term
|
Definition
| The total cost of a risk to an organization on an annual basis. |
|
|
Term
|
Definition
| A network-based attack where the attacker dramatically increases the bandwidth sent to a victim during a DDoS attack by implementing an amplification factor |
|
|
Term
|
Definition
| A network monitoring system that uses a baseline of acceptable outcomes or event patterns to identify events that fall outside the acceptable range. |
|
|
Term
|
Definition
| A proprietary wireless network technology that is similar to Bluetooth implementations that consume a smaller amount of energy. |
|
|
Term
|
Definition
| A category of software programs that scan a computer or network for known viruses, Trojans, worms, and other malicious software. |
|
|
Term
|
Definition
| A program that will detect specific words that are commonly used in spam messages |
|
|
Term
|
Definition
| Software that is specifically designed to protect systems against spyware attacks |
|
|
Term
|
Definition
| An application that scans files for executable code that matches specific patterns that are known to be common to viruses. |
|
|
Term
|
Definition
| The practice of preventing undesirable programs from running on a computer, computer network, or mobile device |
|
|
Term
| application container/Applicatio Cell |
|
Definition
| A virtualization method where applications run in isolated containers on the host operating system instead of in separate VM's |
|
|
Term
|
Definition
| The practice of allowing approved programs to run on a computer, computer network, or mobile device |
|
|
Term
|
Definition
| A threat that uses multiple attack vectors to gain unauthorized access to sensitive resources and then maintain that access for a long period of time. |
|
|
Term
|
Definition
| A virus that can conceal its location or otherwise render itself harder to detect by anti-malware programs. |
|
|
Term
|
Definition
| How many times per year a particular loss is expected to occur. |
|
|
Term
|
Definition
| (Address Resolution Protocol) The mechanism by which individual hardware MAC addresses are matched to an IP address on a network. |
|
|
Term
|
Definition
| A network-based attack where an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient. |
|
|
Term
|
Definition
| A network-based attack where an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient |
|
|
Term
|
Definition
| The process of taking inventory of and tracking all of an organization's objects of value. |
|
|
Term
|
Definition
| A two-way encryption scheme that uses paired private and public keys. |
|
|
Term
|
Definition
| Any technique used to exploit a vulnerability in an application or physical computer system without the authorization to do so. |
|
|
Term
|
Definition
| The portion of a system or application that is exposed and available to attackers. |
|
|
Term
|
Definition
| A term for users who gain unauthorized access or cause damage to computers and networks for malicious purposes. |
|
|
Term
|
Definition
| The portion of accounting that entails security professionals examining logs of what was recorded. |
|
|
Term
|
Definition
| A policy that defines the rules for user behavior with regard to using organizational resources. |
|
|
Term
|
Definition
| A method of validating a particular entity's or individual's unique credentials. |
|
|
Term
|
Definition
| The process of determining what rights and privileges a particular entity has. |
|
|
Term
|
Definition
| The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need. |
|
|
Term
|
Definition
| A mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication. |
|
|
Term
|
Definition
| A type of attack where the attacker creates a software application or bogus user account to gain access to a system and its resources. |
|
|
Term
|
Definition
| A documented plan that includes specific procedures and processes that are applied in the event that a change or modification made to a system must be undone |
|
|
Term
|
Definition
| The act of collecting information about network hosts by examining text-based welcome screens that are displayed by some hosts. |
|
|
Term
|
Definition
| A collection of security and configuration settings that are to be applied to a particular system or network in the organization. |
|
|
Term
|
Definition
| A policy that describes and ratifies the organization's overall business continuity strategy. |
|
|
Term
|
Definition
| A key-derivation function based on the Blowfish cipher algorithm. |
|
|
Term
| behavior-based monitoring |
|
Definition
| A network monitoring system that detects changes in normal operating data sequences and identifies abnormal sequences. |
|
|
Term
|
Definition
| A systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations. |
|
|
Term
|
Definition
| Authentication schemes based on individuals' physical characteristics. |
|
|
Term
|
Definition
| A firmware interface that initializes hardware for an operating system boot. |
|
|
Term
|
Definition
| A type of password attack that exploits weaknesses in the mathematical algorithms used to encrypt passwords, in order to take advantage of the probability of different password inputs producing the same encrypted output. |
|
|
Term
|
Definition
| A decentralized, encrypted electronic payment system that is used by legitimate entities and threat actors alike. |
|
|
Term
|
Definition
| A penetration test where the tester is given no information about the system being tested. |
|
|
Term
|
Definition
| A hacker who exposes vulnerabilities without organizational consent, for financial gain or for some malicious purpose. |
|
|
Term
|
Definition
| The practice of preventing undesirable programs from running on a computer, computer network, or mobile device |
|
|
Term
|
Definition
| A type of symmetric encryption that encrypts data one block at a time, often in 64-bit blocks. It is usually more secure, but is also slower, than stream ciphers. |
|
|
Term
|
Definition
| A freely available 64-bit block cipher algorithm that uses a variable key length. |
|
|
Term
|
Definition
| A wireless attack where an attacker sends unwanted Bluetooth signals from a smartphone, mobile phone, tablet, or laptop to other Bluetooth-enabled devices. |
|
|
Term
|
Definition
| A wireless attack where an attacker gains access to unauthorized information on a wireless device by using a Bluetooth connection. |
|
|
Term
|
Definition
| A short-range wireless radio network transmission medium normally used to connect two personal devices, such as a mobile phone and a wireless headset |
|
|
Term
|
Definition
| A set of computers that has been infected by a control program called a bot that enables attackers to exploit the computers to mount attacks. |
|
|
Term
|
Definition
| A business agreement that defines how a partnership between organizations will be conducted, and what is expected of each organization. |
|
|
Term
|
Definition
| A type of hijacking attack where the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity. Sometimes referred to as brandjacking |
|
|
Term
|
Definition
| A device similar to a switch that has one port for incoming traffic and one port for outgoing traffic. |
|
|
Term
|
Definition
| A type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords. |
|
|
Term
|
Definition
| An application attack that exploits fixed data buffer sizes in a target piece of software by sending data that is too large for the buffer. |
|
|
Term
|
Definition
| A collection of processes that enable an organization to maintain normal business operations in the face of some adverse event. |
|
|
Term
|
Definition
| A mobile deployment model that describes how employees can use their own personal mobile devices to get work done, if they so choose. |
|
|
Term
|
Definition
| A server that can issue digital certificates and the associated public/ private key pairs. |
|
|
Term
|
Definition
| A single CA or group of CAs that work together to issue digital certificates. |
|
|
Term
|
Definition
| A smart card that provides certificate-based authentication and supports two-factor authentication |
|
|
Term
|
Definition
| A web page that a client is automatically directed to when connecting to a network, usually through public WI-FI. |
|
|
Term
|
Definition
| A service offered by some SECaaS vendors to establish security gateways sitting between the organization's onĀ premises network and the cloud network, ensuring that traffic both ways complies with policy. |
|
|
Term
|
Definition
| An encryption mode of operation where an exclusive or (XOR) is applied to the first plain text block. |
|
|
Term
|
Definition
| A set of standards developed by a group of governments working together to create a baseline of security assurance for a trusted operating system (TOS). |
|
|
Term
|
Definition
| An AES cipher-based encryption protocol used in WPA2. |
|
|
Term
|
Definition
| The use of surveillance cameras that do not openly broadcast signals. |
|
|
Term
|
Definition
| A connection method that enables mobile devices to connect to wireless transceivers in fixed locations all over the world. |
|
|
Term
|
Definition
| A metric for bio metric devices that describes the threshold values of the FAR and FRR. A low CER signifies a highly accurate biometric system. |
|
|
Term
|
Definition
| A linked path of verification and validation to ensure the validity of a digital certificate's issuer |
|
|
Term
|
Definition
| A method of trusting digital certificates that bypasses the CA hierarchy and chain of trust to minimize man-in-the-middle attacks. |
|
|
Term
|
Definition
| An encryption mode of operation where an initialization vector (IV) is encrypted before its result is XORed with the previous plain text block. |
|
|
Term
|
Definition
| The record of evidence history from collection, to presentation in court, to disposal. |
|
|
Term
|
Definition
| A linked path of verification and validation to ensure the validity of a digital certificate' issuer. |
|
|
Term
|
Definition
| The process of approving and executing change in order to assure maximum security, stability, and availability of IT services. |
|
|
Term
|
Definition
| An encrypted remote access authentication method that enables connections from any authentication method requested by the server, except for PAP and SPAP un-encrypted authentication. |
|
|
Term
|
Definition
| The state of a virtual machine at a specific point in time. |
|
|
Term
|
Definition
| A cryptographic attack where the attacker analyzes a selected cipher text message and tries to find the matching plain text. |
|
|
Term
|
Definition
| A cryptographic attack where the attacker encrypts a selected plain text message and analyzes the resulting cipher text to crack the cipher. |
|
|
Term
|
Definition
| The three basic principles of security control and management: confidentiality, integrity, & availability. Also known as the information security triad or triple. |
|
|
Term
|
Definition
| An algorithm used to encrypt or decrypt data. |
|
|
Term
|
Definition
| A collection of symmetric and asymmetric encryption algorithms commonly used in SSL/TLS connections. |
|
|
Term
|
Definition
| Data that has been encoded and is unreadable |
|
|
Term
|
Definition
| A cryptographic attack where the attacker has access to the cipher text and tries to use frequency analysis or other methods to break the cipher |
|
|
Term
|
Definition
| Unencrypted, readable data that is not meant to be encrypted |
|
|
Term
|
Definition
| A type of hijacking attack that forces a user to unintentionally click a link that is embedded in or hidden by other web page elements |
|
|
Term
|
Definition
| A software attack that exploits the trust relationship between a client and the server it connects t |
|
|
Term
|
Definition
| A method of computing that involves real-time communication over large distributed networks to provide the resources, software, data, & media needs of a user, business, or organization |
|
|
Term
|
Definition
| A framework for IT management and governance created by ISACA |
|
|
Term
|
Definition
| An evaluation used to identify potential weaknesses in an application |
|
|
Term
|
Definition
| A form of digital signature that guarantees that source code and application binaries are authentic and have not been tampered wit |
|
|
Term
|
Definition
| A predetermined alternate location where a network can be rebuilt after a disaster |
|
|
Term
|
Definition
| The act of two different plain text inputs producing the same exact cipher-text output |
|
|
Term
|
Definition
| Code that is converted from high-level programming language source code into a lower level code that can then be directly executed by the system. |
|
|
Term
|
Definition
| The practice of ensuring that the requirements of legislation, regulation s, industry codes and standards, and organizational standards are me |
|
|
Term
|
Definition
| The practice of collecting and analyzing data from storage devices, computer systems, networks, and wireless communications and presenting the information as a form of evidence in the court of law |
|
|
Term
|
Definition
| The fundamental security goal of keeping information and communications private and protected from unauthorized access |
|
|
Term
|
Definition
| A cryptographic technique that makes the relationship between an encryption key and its cipher-text as complex and opaque as possible |
|
|
Term
| Context Aware Authentication |
|
Definition
| A mobile device feature that takes each individual situation into consideration when deciding whether or not to authenticate a user or authorize access to remote apps and data |
|
|
Term
|
Definition
| The practice of Constantly scanning an environment for threats, vulnerabilities and other areas of risk |
|
|
Term
|
Definition
| Countermeasures that avoid, mitigate, or counteract security risks due to threats and attacks |
|
|
Term
|
Definition
| A piece of data-such as an authentication token that is sent by a website to a client and stored on the client's computer |
|
|
Term
|
Definition
| An application attack where an attacker injects a meta tag in an HTTP header, making it possible to modify a cookie stored in a browser |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A mobile deployment model that allows the organization to choose which devices they want employees to work with, while still allowing the employee some freedom to use the device for personal activities |
|
|
Term
|
Definition
| A security mechanism that helps mitigate the consequences of a threat or attack from adversely affecting the computer system |
|
|
Term
|
Definition
| A user who breaks encryption codes, defeats software copy protections, or specializes in breaking into systems |
|
|
Term
|
Definition
| An application that stores passwords in an encrypted database for easy retrieval by the appropriate user |
|
|
Term
|
Definition
| A list of certificates that were revoked before their expiration date |
|
|
Term
|
Definition
| A form of ransomware that uses encryption to render the victim's data inaccessible |
|
|
Term
|
Definition
| A software attack that exploits weaknesses in cryptographic system elements such as code, ciphers, protocols, and key management systems |
|
|
Term
|
Definition
| Any software or hardware solution that implements one or more cryptographic concepts, such as different encryption and decryption algorithm |
|
|
Term
|
Definition
| A security countermeasure that mitigates the impact of a rainbow table attack by adding a random value to ('salting") each plain text input |
|
|
Term
|
Definition
| The science of hiding information, most commonly by encoding and decoding a secret code used to send messages |
|
|
Term
|
Definition
| A cryptographic module that implements Microsoft's CryptoAPI |
|
|
Term
|
Definition
| A message sent to a certificate authority in which a resource applies for a certificate |
|
|
Term
|
Definition
| A web application attack that takes advantage of the trust established between an authorized user of a website and the website itself |
|
|
Term
|
Definition
| An encryption mode of operation where a numerical counter value is used to create a constantly changing IV |
|
|
Term
|
Definition
| An encryption mode of operation where a numerical counter value is used to create a constantly changing IV |
|
|
Term
|
Definition
| A mobile deployment model that allows employees to select a mobile device from a list of accepted devices to use for work purposes. |
|
|
Term
|
Definition
| In DAC, access is controlled based on a user's identity. Objects are configured with a list of users who are allowed access to them. An administrator has the discretion to place the user on the list or not. If a user i-s on the list, the user is granted access; if the user is not on the list, access is denied |
|
|
Term
|
Definition
| Security Measures implemented to prevent key assets from being damaged |
|
|
Term
|
Definition
| Information that is primarily stored on specific media, rather than moving from one medium to another |
|
|
Term
|
Definition
| The practice of thoroughly eliminating data from storage media so that it cannot be recovered. |
|
|
Term
|
Definition
| The process by which an attacker takes data that is stored inside of a private network and moves it to an external network |
|
|
Term
|
Definition
| Information that primarily moves from medium to medium, such as over a private network or the Internet |
|
|
Term
|
Definition
| Information that is currently being created, deleted, read from, or written to |
|
|
Term
|
Definition
| The process of maintaining the existence of and control over certain data in order to comply with business policies and/or applicable laws and regulations |
|
|
Term
|
Definition
| The security controls and measures taken to keep an organization's data safe and accessible, and to prevent unauthorized access to it |
|
|
Term
|
Definition
| The sociopolitical outlook of a nation concerning computing technology and information |
|
|
Term
|
Definition
| A network-based attack where an attacker hijacks or manipulates multiple computers (through the use of zombies or drones) on disparate networks to carry out a DoS attack |
|
|
Term
|
Definition
| The process of translating ciphertext to plaintext |
|
|
Term
|
Definition
| A cryptographic technique that converts ciphertext back to plaintext |
|
|
Term
|
Definition
| A technique for removing duplicate copies of repeated data. In SIEM, the removal of redundant information provided by several monitored systems |
|
|
Term
|
Definition
| Those portions of the World Wide Web that are not indexed by standard search engines. |
|
|
Term
|
Definition
| A more comprehensive approach to layered security that also includes non-technical defenses like user training and physical protection |
|
|
Term
|
Definition
| A data disposal method that applies a strong magnetic force to a disk drive so that it loses its magnetic charge and is rendered inoperable. |
|
|
Term
|
Definition
| A Windows feature that prevents malicious code in memory from executing |
|
|
Term
|
Definition
| (Data Encryption Standard) A symmetric encryption algorithm that encrypts data in 64- bit blocks using a 56-bit key, with 8 bits used for parity |
|
|
Term
|
Definition
| The act of determining if a user has tried to access unauthorized data, or scanning the data and networks for any traces left by an intruder in any attack against the system. |
|
|
Term
|
Definition
| A security mechanism that helps to discover if a threat or vulnerability has entered into the computer system |
|
|
Term
|
Definition
| A piece of hardware such as a. computer, server, printer, or smartphone |
|
|
Term
|
Definition
| A combination of software development and systems operations, and refers to the practice of integrating one discipline with the other |
|
|
Term
|
Definition
| A cryptographic protocol that provides for secure key exchange |
|
|
Term
|
Definition
| A protocol used to automatically assign IP addressing information to IP network computers. |
|
|
Term
|
Definition
| A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange by using ephemeral keys. |
|
|
Term
|
Definition
| An authentication protocol that allows for a variety of connection types, such as wireless. |
|
|
Term
|
Definition
| A type of password attack that compares encrypted passwords against a predetermined list of possible password values |
|
|
Term
|
Definition
| A backup type in which all selected files that have changed since the last full bach-up are backed up |
|
|
Term
|
Definition
| A cryptographic technique that makes ciphertext change drastically upon even the slightest changes in the plaintext input |
|
|
Term
|
Definition
| An electronic document that associates credentials with a public key |
|
|
Term
|
Definition
| A message digest that has been encrypted again with a user's private key |
|
|
Term
|
Definition
| A network service that stores identity information about all the objects in a particular network, inchiding users, groups, servers, client computers, and printers |
|
|
Term
|
Definition
| An application attack that allows access to commands, files, and directories that may or may not be connected to the web document root directory |
|
|
Term
|
Definition
| A major component of business continuity that focuses on repairing, reconstructing, restoring, and replacing systems, personnel, and other |
|
|
Term
|
Definition
| A software vulnerability that can occur when a Wmdows-based application attempts to force another mnning application to load a dynamicĀ link library (DLL) in memory that could cause the victini application to experience instability or leak sensitive information |
|
|
Term
|
Definition
| A software solution that detects and prevents sensitive information in a system or network &om being stolen or otherwise falling into the wrong hands |
|
|
Term
|
Definition
| A small section of a private network that is located behind one firewall or between two firewalls and made available for public access |
|
|
Term
|
Definition
| The service that maps names to IP addresses on most TCP/IP networks, including the Internet |
|
|
Term
|
Definition
| A hijacking attack where an attacker sets up a rogue DNS server This rogue DNS server responds to legitimate requests with IP addresses for malicious or non-existent websites |
|
|
Term
|
Definition
| A network-based attack where an attacker exploits the traditionally open nature of the DNS system to redirect a domain name to an IP address of the attacker's choosing |
|
|
Term
|
Definition
| A network-based attack where an attacker exploits the traditionally open nature of the DNS system to redirect a domain name to an IP address of the attacker's choosing |
|
|
Term
|
Definition
| A security protocol that provides authentication of DNS data and upholds DNS data integrity |
|
|
Term
|
Definition
| A type of hijacking attack where the attack.er steals a domain name by altering its registration information and then transferring the domain name to another entity. Sometimes referred to as brandjacking |
|
|
Term
|
Definition
| A network-based attack where the attacker disables systems that provide network services by consuming a network link's available bandwidth, consuming a single system's available resources, or exploiting programming flaws in an application or operating system |
|
|
Term
|
Definition
| A cryptographic attack where the attacker exploits the need for backward compatibility to force a computer system to abandon the use of encrypted messages in favor of plaintext messages |
|
|
Term
|
Definition
| A software attack where the attacker rewrites or replaces the legitimate device driver or application programming interface (API) to enable malicious activity to be performed |
|
|
Term
|
Definition
| A computer that has been infected with a bot and is being used by an attackr to mount an attack-also called a Zombie |
|
|
Term
|
Definition
| A policy that describes and ratifies the organization's disaster recovery strategy\ |
|
|
Term
|
Definition
| A public key encryption standard used for digital signatures that provides authentication and integrity verification for messages\ |
|
|
Term
|
Definition
| A human-based attack where the goal is to reclaim important information by inspecting the contents of trash containers\ |
|
|
Term
|
Definition
| A type of digital certificate that proves that some entity has control over a particular domain name. Considered to be weaker than EV\\ |
|
|
Term
|
Definition
| A rating from 1 to 7 that states the level of secure features offered by an operating system as defined by the Common Criteria (CC) |
|
|
Term
|
Definition
| A wireless authentication protocol that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication |
|
|
Term
|
Definition
| An EAP method that is expected to address the shortcomings of LEAP. |
|
|
Term
|
Definition
| An EAP method that requires a client-side certificate for authentication using SSL/TLS. |
|
|
Term
|
Definition
| A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also known as a sniffing attack. |
|
|
Term
|
Definition
| An encryption mode of operation where each plain-text block is encrypted with the same key |
|
|
Term
|
Definition
| An asymmetric encryption technique that leverages the algebraic structures of elliptic curves over finite fields |
|
|
Term
|
Definition
| A cryptographic protocol that is based on DiffieĀ Hellman and that provides for secure key exchange by using ephemeral keys and elliptic curve cryptography |
|
|
Term
|
Definition
| A metric for bio metric devices that describes the threshold values of the FAR and FRR. A low CER signifies a highly accurate bio metric system |
|
|
Term
|
Definition
| Microsoft Windows NTFS-based public key encryption |
|
|
Term
|
Definition
| An improvement over IGRP that includes features that support VLSM and classfull and classless sub net masks |
|
|
Term
|
Definition
| The property by which a computing environment can instantly react to both increasing and decreasing demands in workload |
|
|
Term
|
Definition
| A computer hardware and software system that has a specific function within a larger system |
|
|
Term
|
Definition
| A disruption of electrical current that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit |
|
|
Term
|
Definition
| A short burst of electrical interference caused by an abrupt and rapid acceleration of charged particles, which can short-circuit and damage electronic components |
|
|
Term
|
Definition
| The process of translating plain-text to cipher-text |
|
|
Term
|
Definition
| A security technique that converts data from plain-text form into coded (or cipher-text) form so that only authorized parties with the necessary decryption information can decode and read the data |
|
|
Term
|
Definition
| Software that incorporates anti-malware scanners into a larger suite of security controls |
|
|
Term
|
Definition
| An IPSec protocol that provides authentication for the origin of transmitted data, integrity and protection against replay attacks, and encryption to support the confidentiality of transmitted data |
|
|
Term
|
Definition
| Considered to be stronger than DV |
|
|
Term
|
Definition
| A wireless access point that deceives users into believing that it is a legitimate network access point |
|
|
Term
|
Definition
| A private network that provides some access to outside parties, particularly vendors, partners, and select customers |
|
|
Term
|
Definition
| A technique that ensures a redundant component, device, or application can quickly and efficiently take over the functionality of an asset that has failed |
|
|
Term
|
Definition
| Something that is identified by a scanner or other assessment tool as not being a vulnerability, when in fact it is |
|
|
Term
|
Definition
| Something that is identified by a scanner or other assessment tool as being a vulnerability, when in fact it is not |
|
|
Term
|
Definition
| A metric for bio metric devices that describes the percentage of unauthorized users who were incorrectly authenticated by a bio metric system |
|
|
Term
|
Definition
| A wire mesh container that blocks external electromagnetic fields from entering into the container |
|
|
Term
|
Definition
| The ability of a computing environment to withstand a foreseeable component failure and continue to provide an acceptable level of service |
|
|
Term
|
Definition
| A storage technology that encrypts an entire storage drive at the hardware level |
|
|
Term
|
Definition
| A software or hardware device that protects a system or network by blocking unwanted network traffic |
|
|
Term
|
Definition
| The first experienced person or team to arrive at the scene of an incident |
|
|
Term
|
Definition
| Locally Shared Object-Data Stored on a users computer after visiting a website that uses Adobe Flash Player-these can be used to track a users's activity |
|
|
Term
|
Definition
| A security control in network switches that protects hosts on the switch against SYN flood and ping flood DoS attacks. |
|
|
Term
|
Definition
| A DoS attack where the attacker sends spoofed UDP traffic to a router's broadcast address, intending for a large amount of UDP traffic to be .returned to the target computer |
|
|
Term
|
Definition
| A cryptographic analysis technique where an attacker identifies repeated letters or groups of letters and compares them to how often they occur in plain-text, in an attempt to fully or partially reveal the plain-text message |
|
|
Term
|
Definition
| A metric for bio metric devices that describes the percentage of authorized users who were incorrectly rejected by a bio metric system |
|
|
Term
|
Definition
| A communications protocol that enables the transfer of files between a user's workstation and a remote host |
|
|
Term
|
Definition
| A secure version of the File Transfer Protocol that uses a Secure Shell tunnel as an encryption method to transfer, access, and manage files |
|
|
Term
|
Definition
| A protocol that combines the use of FTP with additional support for TLS and SSL |
|
|
Term
|
Definition
| A protocol that combines the use of FTP with additional support for TLS and SSL |
|
|
Term
|
Definition
| A backup type in which all selected files,regardless of prior state, are backed up |
|
|
Term
|
Definition
| A type of port scan that completes the three way handshake, identifies open ports, and collects information about network hosts by banner grabbing |
|
|
Term
|
Definition
| A dynamic code analysis technique that involves sending a running application random and unusual input so as to evaluate how the app responds |
|
|
Term
|
Definition
| The reliable connection range and power of a wireless signal, measured in decibels |
|
|
Term
|
Definition
| An encryption mode of operation that adds authentication to the standard encryption services of a cipher mode |
|
|
Term
|
Definition
| The practice of creating a virtual boundary based on real-world geography |
|
|
Term
|
Definition
| The process of identifying the real-world geographic location of an object, often by associating a location such as a street address with an IP address, hardware address, Wi-Fi positioning system, GPS coordinates, or some other form of information |
|
|
Term
|
Definition
| The process of adding geographic location metadata to captured media such as pictures or videos |
|
|
Term
|
Definition
| A free open-source version of PG P that provides the equivalent encryption and authentication services |
|
|
Term
|
Definition
| A penetration test where the tester may have knowledge of internal architectures and systems, or other preliminary information about the system being tested |
|
|
Term
|
Definition
| A hacker who exposes security flaws in applications and operating systems without consent, but not ostensibly for malicious purposes |
|
|
Term
|
Definition
| Suggestions, recommendations, or best practices for how to meet a policy standard |
|
|
Term
|
Definition
| Someone who excels at programming or managing and configucing computer systems, or has the skills to gain access to computer systems through unauthorized or unapproved means |
|
|
Term
|
Definition
| A hacker who gains unauthorized access to and causes disruption in a computer system in an attempt to achieve political or social change |
|
|
Term
|
Definition
| A security technique in which the default configuration of a system is altered to protect the system against attacks |
|
|
Term
|
Definition
| An attack that targets a computer's physical components and peripherals, including its hard disk, motherboard, keyboard, network cabling, or smart card reader, and is designed to destroy hardware or acquire sensitive information stored on the hardware |
|
|
Term
|
Definition
| The value that results from hashing encryption. Also known as hash value or message digest |
|
|
Term
|
Definition
| The value that results from hashing encryption. Also known as hash value or message digest |
|
|
Term
|
Definition
| A process or function that transforms plaintext into ciphertext that cannot be directly decrypted |
|
|
Term
|
Definition
| A network monitoring system that uses known best practices and characteristics in order to identify and fix issues within the network |
|
|
Term
|
Definition
| A type of IDS that monitors a computer system for unexpected behavior or drastic changes to the system's state |
|
|
Term
|
Definition
| The property that defines how closely systems approach the goal of providing data availability 100 percent of tl1e time while maintaining a high level of system performance |
|
|
Term
|
Definition
| A group of network-based attacks where an attacker gains control of the communication between two systems, often masquerading as one of the entities |
|
|
Term
|
Definition
| A type of IPS that monitors a computer system for unexpected behavior or drastic changes to the system's state and reacts in real time to block it |
|
|
Term
|
Definition
| A method used to verify both the integrity and authenticity of a message by combining cryptographic hash functions, such as MDS or SHA -1, with a secret key |
|
|
Term
|
Definition
| An email-based, IM-based, or web-based attack that is intended to trick the user into performing unnecessary or undesired actions, such as deleting important system files in an attempt to remove a virus, or sending money or important information via email or online forms |
|
|
Term
|
Definition
| An entire dummy network used to lure attackers |
|
|
Term
|
Definition
| A security tool used to lure attackers away from the actual network components. Also called a decoy or sacrificial lamb |
|
|
Term
|
Definition
| Software that is installed on a single system to specifically guard against networking attacks |
|
|
Term
|
Definition
| A method used within data centers and computer rooms to control the temperature and humidity by directing the flow of hot and cold air |
|
|
Term
|
Definition
| A fully configured alternate network that can be online quickly after a disaster |
|
|
Term
|
Definition
| A patch that is often issued on an emergency basis to address a specific security flaw |
|
|
Term
|
Definition
| An algorithm that generates a one-time passwo.rd using a hash-based authentication code to verify the authenticity of the message |
|
|
Term
|
Definition
| A physical device that provides root of trust capabilities |
|
|
Term
|
Definition
| A protocol that defines the interaction between a web server and a browser |
|
|
Term
|
Definition
| A secure version of HTTP that provides a secure connection between a web browser and a server |
|
|
Term
|
Definition
| A system that controls the air quality and flow inside a building |
|
|
Term
|
Definition
| An attack that uses multiple attack methods, including dictionary, rainbow table, and brute force attacks when trying to crack a password |
|
|
Term
|
Definition
| A layer of software that separates a VM's software from the physical hardware it mns on |
|
|
Term
|
Definition
| A computing method that uses the cloud to provide any or all infrastructure needs |
|
|
Term
|
Definition
| A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications |
|
|
Term
|
Definition
| An IP network service that reports on connections between two hosts |
|
|
Term
|
Definition
| A networked system that controls critical infrastructure such as water, electrical, transportation, and telecommunication services |
|
|
Term
|
Definition
| The process of claiming some information about the nature of a paiticular entity |
|
|
Term
|
Definition
| The practice of linking a single identity across multiple disparate identity management systems |
|
|
Term
|
Definition
| A software and/or hardware system that scans, audits, and monitors the security infrastructure for signs of attacks in progress |
|
|
Term
|
Definition
| A professional association of electrical and electronics engineers that develops industry standards for a variety of technologies |
|
|
Term
|
Definition
| A distance-vector routing protocol developed by Cisco as an improvement over RIP and RIP v2. |
|
|
Term
|
Definition
| A type of communication service which involves a private dialogue between two persons via instant text-based messages over the Internet |
|
|
Term
|
Definition
| A protocol used to retrieve email messages and folders from a mail server |
|
|
Term
|
Definition
| a version of the internet Message Access Protocol that uses SSL or TLS to provide secure communication between mail client and the mail server |
|
|
Term
|
Definition
| a version of the internet Message Access Protocol that uses SSL or TLS to provide secure communication between mail client and the mail server |
|
|
Term
|
Definition
| A system that is not upgraded in-place, but is progranunatically destroyed and then recreated from scratch every time the configuration changes |
|
|
Term
|
Definition
| A type of social engineering in which an attacker pretends to be someone they are not, typically to pretend to be average user in distress, or a help desk representative |
|
|
Term
|
Definition
| The principle that establishes that everything that is not explicitly allowed is denied |
|
|
Term
|
Definition
| A description of the events that occurred during a security incident |
|
|
Term
|
Definition
| The practice of using an organized methodology to address and manage security breaches and attacks while limiting danlige and reducing recovery costs |
|
|
Term
|
Definition
| A backup type in which all selected files that have changed since the last full or incremental backup (whichever was most recent) are backed up |
|
|
Term
|
Definition
| The protection of available information or information resources from unauthorized access, attack, theft, or data damage |
|
|
Term
| information security triad |
|
Definition
| The three basic principles of security control and management: confidentiality, integrity, and availability. Also known as the information security triad or triple triad |
|
|
Term
|
Definition
| A form of wireless transmission in which signals are sent as pulses of infrared light |
|
|
Term
|
Definition
| An information technology strategy that asserts that the organization's infrastructure can be quickly configured and deployed as desired through programming scripts and other code-files, rather than through standard software tools. |
|
|
Term
|
Definition
| Limits what data a user can enter into specific fields, like not allowing special characters in a user name field |
|
|
Term
|
Definition
| Present and past employees, contractors, partners, and any entity that has access to proprietary confidential information and whose actions result in compromised security |
|
|
Term
|
Definition
| The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications |
|
|
Term
|
Definition
| In wireless networking, the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals used by computing devices and other network devices |
|
|
Term
|
Definition
| The collection of rules required for Internet connectivity |
|
|
Term
|
Definition
| A private network that is only accessible by the organization's own personnel |
|
|
Term
|
Definition
| (Internet of Things)(electronic or not) that are connected to the wider Internet by using embedded electronic components |
|
|
Term
|
Definition
| An attack in which an attacker sends IP packets from a false (or spoofed) source address to communicate with targets |
|
|
Term
|
Definition
| An inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it |
|
|
Term
|
Definition
| A set of open, non-proprietary standards that are used to secure data through authentication and encryption as the data travels across the network or the Internet |
|
|
Term
|
Definition
| (IP version 4) An Internet standard that uses a 32-bit number assigned to a computer on a TCP /IP network |
|
|
Term
|
Definition
| (IP version 6) An Internet standard that increases the available pool of IP addresses by implementing a 128-bit binary address space. |
|
|
Term
|
Definition
| A document or series of documents that describe procedures for detecting, responding to, and minimizing the effects of security incidents |
|
|
Term
|
Definition
| A business agreement that focuses on ensuring security between organizations in a partnership |
|
|
Term
|
Definition
| A standard model for information systems management practices created by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) |
|
|
Term
|
Definition
| A component of the business continuity plan (BCP) that specifies alternate IT procedures to switch over to when the organization is faced with an attack m disruption of service leading to a disaster |
|
|
Term
|
Definition
| A comprehensive IT management structure derived from recommendations originally developed by the United Kingdom Government's Central Computer and Telecommunications Agency (CCTA) |
|
|
Term
|
Definition
| A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption |
|
|
Term
|
Definition
| A wireless attack where the attacker is able to predict or control the IV of an encryption process, thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user or network |
|
|
Term
|
Definition
| The process of removing software restrictions on an iOS device, allowing the user to run apps not downloaded from the official App Store |
|
|
Term
|
Definition
| In wireless networking, the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals used by computing devices and other network devices |
|
|
Term
|
Definition
| A concept that states that personnel -should rotate between job roles to prevent abuses of power, reduce boredom, and improve professional skills |
|
|
Term
|
Definition
| An authentication service that is based on a time-sensitive ticket-granting system. It uses an SSO method where the user enters access credentials that a.re then passed to the authentication server, which contains the allowed access credentials |
|
|
Term
|
Definition
| A specific piece of information that is used in conjunction with an algorithm to perform encryption and decryption |
|
|
Term
|
Definition
| A method for backing up private keys to protect them while allowing trusted third parties to access the keys under certain conditions |
|
|
Term
|
Definition
| A third party that maintains a backup copy of private keys |
|
|
Term
|
Definition
| Any method by which cryptographic keys are transferred among users, thus enabling the use of a cryptographic algorithm |
|
|
Term
|
Definition
| The asymmetric encryption process of producing a public and private key pair using a specific application |
|
|
Term
|
Definition
| A technique that strengthens potentially weak cryptographic keys, such as passwords or passphrases created by people , against brute force attacks |
|
|
Term
|
Definition
| A hardware device or software application that recognizes and records every keystroke made by a user |
|
|
Term
|
Definition
| A type of authentication that relies on detailed information that describes exactly when a keyboard key is pressed and released as someone types information into a computer or other electronic device |
|
|
Term
|
Definition
| A cryptographic attack where the attacker has access to plain-text and the corresponding cipher-text, and tries to derive the correlation between them |
|
|
Term
|
Definition
| The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP, Frame Relay, or ATM |
|
|
Term
|
Definition
| An approach to operational security that incorporates many different avenues of defense |
|
|
Term
|
Definition
| A simple network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information |
|
|
Term
|
Definition
| An application attack that targets web-based applications by fabricating LDAP statements that are typically created by user input |
|
|
Term
|
Definition
| A method of implementing LDAP using SSL/TLS encryption |
|
|
Term
|
Definition
| Cisco Systems' proprietary EAP implementation |
|
|
Term
|
Definition
| The principle that establishes that users and software should have the minimal level of access that is necessary for them to perform the duties required of them |
|
|
Term
|
Definition
| A process designed to preserve all relevant information when litigation is reasonably expected to occur |
|
|
Term
|
Definition
| The process of booting into an operating system that runs directly on RAM rather than being installed on a storage device |
|
|
Term
|
Definition
| (after-action report) An analysis of events that can provide insight into how to improve response processes in the future |
|
|
Term
|
Definition
| A network device that distributes the network traffic or computing workload among multiple devices in a network |
|
|
Term
|
Definition
| The act of recording data about activity on a computer |
|
|
Term
|
Definition
| A piece of code that sits dormant on a target computer until it is triggered by the occurrence of specific conditions, such as a specific date and time |
|
|
Term
|
Definition
| Security measures implemented to prevent key assets from being damaged |
|
|
Term
|
Definition
| Data stored on a user's computer after visiting a website that uses Adobe Flash Player. These can be used to track a user's activity. |
|
|
Term
|
Definition
| A mathematical control that takes into account the total number of key recovery agents (N) along with the number of agents required to perform a key recovery |
|
|
Term
|
Definition
| A system in which objects (files and other resources) are assigned security labels of varying levels, depending on the object's sensitivity. Users are assigned a security level or clearance, and when they try to access an object, their clearance is compared to the object's security label. If there is a matcl1, the user can access the object; if there is no match, the user is denied access. |
|
|
Term
|
Definition
| A unique physical address assigned to each network adapter board at the time of its manufacture |
|
|
Term
|
Definition
| An attack in which an attacker falsifies the factory-assigned MAC address of a device's network interface |
|
|
Term
|
Definition
| The security technique of allowing or denying specific mac addresses from connecting to a network device. |
|
|
Term
|
Definition
| an entity hat is partially or wholly responsible for an incident that affects or has the potential to affect an organization's security |
|
|
Term
|
Definition
| Undesired or unauthorized software that is placed into a target system to disrupt operations or to redirect system resources for the attacker's benefit |
|
|
Term
|
Definition
| Malicious code, such as viruses, Trojans, or worms, which is designed to gain unauthorized access to, make unauthorized use of, or damage computer systems and networks |
|
|
Term
|
Definition
| The practice of isolating malware in a viitual environment where it can be safely analyzed without compromising production systems or the rest of the network |
|
|
Term
| man-in-the-browser attack |
|
Definition
| A type of network-based attack that combines a man-in-the-middle attack with the use of a Trojan horse to intercept and modify web transactions in real time |
|
|
Term
|
Definition
| A form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently |
|
|
Term
|
Definition
| Procedures implemented to monitor the adllerence to organizational security policies |
|
|
Term
|
Definition
| A concept that states that personnel should be required to go on vacation for a period of time so their activities can be reviewed |
|
|
Term
|
Definition
| A physical security control system that has a door at each end of a secure chamber |
|
|
Term
|
Definition
| A hash algorithm, based on RFC 1320, that produces a 128-bit hash value and is used in message integrity checks for data authentication |
|
|
Term
|
Definition
| A hash algorithm, based on RFC 1321, that produces a 128-bit hash value and is used in IPSec policies for data authentication |
|
|
Term
|
Definition
| The process of tracking, controlling, and securing an organization's mobile infrastructure |
|
|
Term
|
Definition
| A method that connects devices to the network and carries data between devices. |
|
|
Term
|
Definition
| A software vulnerability that can occur when software does not release allocated memory when it is done using it, potentially leading to system instability |
|
|
Term
|
Definition
| The value that results from hashing encryption. Also known as hash value or message digest |
|
|
Term
|
Definition
| An embedded systems component that consolidates the functionality of a CPU, memory module, and peripherals. Also known as system on chip (SoC) |
|
|
Term
|
Definition
| An extension of SMTP that enables the exchange of audio, video, images, applications, and other data formats through email |
|
|
Term
|
Definition
| The process of evaluating how well a software project meets the specifications that were defined earlier in development |
|
|
Term
|
Definition
| A non-legally binding business agreement that defines a common goal that cooperating entities work toward without direct monetary compensation |
|
|
Term
|
Definition
| A protocol that strengthens the password authentication provided by Protected Extensible Authentication Protocol (PEAP) |
|
|
Term
|
Definition
| The rating on a device or component that predicts the expected time between failures |
|
|
Term
|
Definition
| The longest period of time a business can be inoperable without causing irrevocable business failure |
|
|
Term
|
Definition
| The average time a device or component is expected to be in operation |
|
|
Term
|
Definition
| The average time taken for a device or component to be repaired, replaced, or otherwise recover from a failure |
|
|
Term
| multi-factor authentication |
|
Definition
| An authentication scheme that requires validation of at least two distinct authentication factors |
|
|
Term
|
Definition
| A security mechanism that requires that each party in a communication verifies the identity of every other party in the communication |
|
|
Term
|
Definition
| The collection of protocols, policies, and hardware that govern access of devices connecting to a network |
|
|
Term
|
Definition
| A RADIUS server configuration that uses a centralized server and clients |
|
|
Term
|
Definition
| A simple form of Internet security that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-mutable addresses internally |
|
|
Term
|
Definition
| A contract that states that an individual will not share certain sensitive information to outside parties under penalty of law |
|
|
Term
|
Definition
| A service that enables applications to properly communicate over different computers in a network |
|
|
Term
|
Definition
| Hardware that translates the data between the network and a device |
|
|
Term
|
Definition
| The general practice of keeping networks separate from one another |
|
|
Term
|
Definition
| The process of multiple connected switches bouncing traffic back and forth for an indefinite period of time |
|
|
Term
|
Definition
| A device or program that can identify the logical topology of a network to reveal its connection pathways |
|
|
Term
|
Definition
| Software that controls network traffic and access to network resources |
|
|
Term
|
Definition
| The division of a large network into smaller logical networks |
|
|
Term
|
Definition
| The general practice of keeping networks separate from one another. |
|
|
Term
|
Definition
| A security control on network devices that creates a copy of network traffic to forward to a sensor or monitor like an IDS |
|
|
Term
|
Definition
| A hardware/ software combination that protects all the computers on a network behind the firewall |
|
|
Term
|
Definition
| A device or program that can identify the logical topology of a network to reveal its connection pathways |
|
|
Term
|
Definition
| A mobile device communication standard that operates at very short range, often through physical contact |
|
|
Term
|
Definition
| A system that uses passive hardware sensors to monitor traffic on a specific segment of the network |
|
|
Term
|
Definition
| An active, inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it |
|
|
Term
|
Definition
| Publications by the National Institute of Standards and Technology (NIST) that focus on computer security standards |
|
|
Term
|
Definition
| The property by which a computing environment is discarded once it has finished its assigned task |
|
|
Term
|
Definition
| The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data |
|
|
Term
|
Definition
| An arbitrary number used only once in a cryptographic communication, often to prevent replay attacks |
|
|
Term
|
Definition
| A software development technique that tries to "repair" invalid input to strip any special encoding and automatically convert the input to a specific format that the application can handle |
|
|
Term
|
Definition
| A challenge-response authentication protocol created by Microsoft for use in its products |
|
|
Term
|
Definition
| An Internet protocol that enables synchronization of device clock times in a network of devices by exchanging time signals |
|
|
Term
|
Definition
| A token-based authorization protocol that is often used in conjunction with OpenID |
|
|
Term
|
Definition
| A technique that essentially "hides" or "camouflages" code or other information so that it is harder to read by unauthorized users |
|
|
Term
|
Definition
| An HTTPĀ based alternative to a certificate revocation list that checks the status of certificates |
|
|
Term
|
Definition
| A method of checking the status of digital certificates where a web server queries the OCSP server at specific .intervals, and the OCSP server responds by providing a timeĀ stamped digital signature. The web server appends this signed response to the SSL/TLS handshake with the client so that the client can verify the certificate's status |
|
|
Term
|
Definition
| An encryption mode of operation where the result of the encrypted IV is fed back to the subsequent operation |
|
|
Term
| offline brute force attack |
|
Definition
| A cryptographic attack where the attacker steals the password, and then tries to decode it by systematically guessing possible keystroke combinations that match the encrypted password |
|
|
Term
|
Definition
| A series of numbers, separated by periods, that describe the identity of the owner of a digital certificate |
|
|
Term
| online brute force attack |
|
Definition
| A Cryptographic attack where the attacker tries to enter a succession of passwords, using the same interface as the target user application |
|
|
Term
|
Definition
| An identity federation method that enables users to be authenticated on cooperating websites by a third-party authentication service |
|
|
Term
|
Definition
| An authentication layer that sits on top of the OAuth 2.0 authorization protocol |
|
|
Term
|
Definition
| Security measures implemented to safeguard all aspects of day-to-day operations, functions, and activities |
|
|
Term
|
Definition
| A concept that dictates what types of systems to prioritize in disaster recovery efforts |
|
|
Term
|
Definition
| The order in which volatile data should be recovered from various storage locations and devices after a security incident occurs |
|
|
Term
|
Definition
| A method of abstracting how different layers of a network structure interact with one another |
|
|
Term
|
Definition
| Information that is legally collected from publicly available origins |
|
|
Term
|
Definition
| A password that is generated for use in one specific session and becomes invalid after the session ends |
|
|
Term
|
Definition
| A computing method that uses the cloud to provide any platform type services. |
|
|
Term
|
Definition
| A device or program that monitors network communications on the network wire or across a wireless network and captures data |
|
|
Term
|
Definition
| An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet |
|
|
Term
|
Definition
| A -remote access authentication service that sends user IDs and passwords as clear text |
|
|
Term
|
Definition
| A network-based attack where the attacker steals hashed user credentials and uses them asĀ is to try to authenticate to the same network the hashed credentials originated on |
|
|
Term
|
Definition
| Any attack where the attacker tries to gain unauthorized access to and use of passwords |
|
|
Term
|
Definition
| A small unit of supplemental code meant to address either a security problem or a functionality flaw in a software package or operating system |
|
|
Term
|
Definition
| A key derivation function used in key stretching to make potentially weak cryptographic keys such as passwords less susceptible to brute force attacks |
|
|
Term
|
Definition
| A encryption mode of operation in which each plain-text block is XORed with the previous plain-text and cipher-text blocks |
|
|
Term
|
Definition
| Similar to EAP-TLS, PEAP is an open standard developed by a coalition made up of Cisco Systems, Microsoft, and RSA Security |
|
|
Term
|
Definition
| A method of evaluating security by simulating an attack on a system |
|
|
Term
|
Definition
| A penetration testing technique where the tester has concluded the initial exploitation, and is now interested in maintaining access to the network |
|
|
Term
| Personal Identity Verification card |
|
Definition
| A smart card that meets the standards for FIPS 201, in that it is resistant to tampering and provides quick electronic authentication of the card's owner |
|
|
Term
|
Definition
| The practice of ensuring that all of an organization's personnel, whether internal or external, ace complying with policy |
|
|
Term
|
Definition
| A characteristic of session encryption that ensures if a key used during a certain session is compromised, it should not affect data previously encrypted by that key |
|
|
Term
|
Definition
| A method of securing emails created to prevent attackers from intercepting and manipulating email and attachments by encrypting and digitally signing the contents of the email using public key cryptography |
|
|
Term
|
Definition
| An attack in which a request for a website, typically an e-commerce site, is redirected to a similar-looking, but fake, website |
|
|
Term
|
Definition
| A type of email-based social engineering attack, in which the attacker sends email from a supposedly reputable source, such as a bank, to tty to elicit private information from the victim |
|
|
Term
|
Definition
| A tool for identifying and analyzing risks to privacy during the development life cycle of a program or system |
|
|
Term
|
Definition
| A human-based attack where an attacker enters a secure area by following a legitimate employee with the employee's knowledge or permission |
|
|
Term
|
Definition
| The pieces of information that a company uses or prefers to use to identify or contact an employee or other individual |
|
|
Term
|
Definition
| A smart card that meets the standards for FIPS 201, in that it is resistant to tampering and provides quick electronic authentication of the card's owner |
|
|
Term
|
Definition
| A penetration testing technique where the tester compromises one central host (the pivot) that allows the tester to access other hosts that would otherwise be inaccessible |
|
|
Term
|
Definition
| A system that is composed of a CA, certificates, software, services, and other cryptographic components, for the purpose of enabling authenticity and validation of data and/or entities |
|
|
Term
|
Definition
| Un-Encrypted data that is meant to be encrypted before it is transmitted, or the result of decryption of encrypted data |
|
|
Term
|
Definition
| A software vulnerability that can occur when the code attempts to remove the relationship between a pointer and the thing it points to (pointee). If the pointee is not properly established, the dereferencing process may crash the application and corrupt memory |
|
|
Term
|
Definition
| Malicious code that is designed to avoid detection by altering its decryption module each time it infects a new file |
|
|
Term
|
Definition
| A protocol used to retrieve email from a mailbox on the mail server |
|
|
Term
|
Definition
| a version of the Post Office Protocol that uses SSL or TLS to provide secure communications |
|
|
Term
|
Definition
| Software that prevents pop-ups from sites that are unknown or untrusted and prevents the transfer of unwanted code to the local system |
|
|
Term
|
Definition
| a version of the Post Office Protocol that uses SSL over TLS to provide secure communications |
|
|
Term
|
Definition
| An endpoint of a logical connection that host computers use to connect to processes or services on other hosts |
|
|
Term
|
Definition
| A network-based attack where an attacker scans computers and other devices to see which ports are listening, in an attempt to find a way to gain unauthorized access |
|
|
Term
|
Definition
| The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links |
|
|
Term
|
Definition
| A VPN protocol that is an extension of the PPP remote access protocol |
|
|
Term
|
Definition
| The security approach of blocking unauthorized access or attacks before they occur |
|
|
Term
|
Definition
| A security mechanism that helps to prevent a threat or attack from exposing a vulnerability in the computer system |
|
|
Term
|
Definition
| The component of asymmetric encryption that is kept secret by one party during two-way encryption |
|
|
Term
|
Definition
| A root CA that is created by a company for use primarily within the company itself |
|
|
Term
|
Definition
| The task of granting privileges to a user only when needed and revoking them as soon as the task is done |
|
|
Term
|
Definition
| The practice of exploiting flaws in an operating system or other application to gain a greater level of access than was intended for the user or application |
|
|
Term
|
Definition
| The use of authentication and authorization mechanisms to provide an administrator with centralized or decentralized control of user and group role-based privilege management |
|
|
Term
|
Definition
| The process by which an algorithm produces numbers that approximate randomness without being truly random |
|
|
Term
|
Definition
| Step-by-step instructions that detail how to implement components of a policy |
|
|
Term
|
Definition
| A method of securing the physical cabling of a communications infrastructure |
|
|
Term
|
Definition
| Software that controls network communications using a set of rules |
|
|
Term
|
Definition
| This type of diagnostic software can examine and display data packets that are being transmitted over a network |
|
|
Term
|
Definition
| A device that acts on behalf of one end of a network connection when communicating with the other end of the connection |
|
|
Term
|
Definition
| A string of text that a VPN or other network service expects to receive prior to any other credentials. In the context of WPA/2-Personal, the key is generated from the wireless password |
|
|
Term
|
Definition
| A document used to determine when a PIA is required |
|
|
Term
|
Definition
| The component of asymmetric encryption that can be accessed by anyone |
|
|
Term
|
Definition
| A root CA that is created by a vendor for general access by the public |
|
|
Term
|
Definition
| An authority in a PKI that processes requests for digital certificates from users |
|
|
Term
|
Definition
| A software vulnerability that can occur when the outcome from execution processes is directly dependent on the order and timing of certain events, and those events fail to execute in the order and timing intended by the developer |
|
|
Term
|
Definition
| A standard protocol for providing centralized authentication and authorization services for remote users |
|
|
Term
|
Definition
| A set of vendor-independent specifications that support redundancy and fault tolerance for configurations on multiple-device storage systems |
|
|
Term
|
Definition
| A type of password attack where an attacker uses a set of related plaintext passwords and their hashes to crack passwords |
|
|
Term
|
Definition
| Software that enables an attacker to take control of a user's system or data and to demand payment for return of that control |
|
|
Term
|
Definition
| A specialized Trojan horse that specifically aims to provide an attacker with unauthorized access to or control of a target computer |
|
|
Term
|
Definition
| A system in which access is controlled based on a user's role. Users are assigned to roles, and network objects are configured to allow access only to specific roles. Roles are created independently of user accounts |
|
|
Term
|
Definition
| A series of variable key-length symmetric encryption algorithms developed by Ronald Rivest |
|
|
Term
|
Definition
| A penetration testing technique where the tester tries to gather as much information as possible about the target(s) |
|
|
Term
|
Definition
| The act of recovering vital data present in files or folders from a crashed system or data storage devices when data has been compromised or damaged |
|
|
Term
|
Definition
| An individual with the necessary credentials to decrypt files that were encrypted by another user |
|
|
Term
|
Definition
| The property by which a computing environment keeps one or more sets of additional resources in addition to the primary set of resources |
|
|
Term
|
Definition
| The process of restructuring application code to improve its design without affecting the external behavior of the application, or to enable it to handle particular situations |
|
|
Term
|
Definition
| An authentication process that enables a host to verify its hardware and software configuration to a remote host, such as a server |
|
|
Term
|
Definition
| A security method of restricting access to sensitive data on a device without deleting it from memory |
|
|
Term
|
Definition
| A security method used to remove and permanently delete sensitive data from a mobile device when it is not in the authorized user's physical possession |
|
|
Term
|
Definition
| A cryptographic attack where the attacker intercepts session keys or authentication traffic and uses them later to authenticate and gain access |
|
|
Term
|
Definition
| A software vulnerability that can occur when software does not properly restrict access to requested or needed resources |
|
|
Term
|
Definition
| The practice of deconstructing software into its base components so that its properties are easier to understand |
|
|
Term
|
Definition
| A technology that uses electromagnetic fields to automatically identify and track tags or chips that a.re affixed to selected objects and that store information about the objects |
|
|
Term
|
Definition
| A routing protocol that configures routers to periodically broadcast their entire routing tables. RIP routers broadcast their tables regardless of whether or not any changes have occurred on the network |
|
|
Term
|
Definition
| A message digest algorithm that is based on the design principles used in MD4 |
|
|
Term
|
Definition
| An information security concept that indicates exposure to the chance of damage or loss, and signifies the likelihood of a hazard or dangerous threat |
|
|
Term
|
Definition
| The security process used for assessing risk damages that affect an organization |
|
|
Term
|
Definition
| The process of identifying risks, analyzing iliem, developing a response strategy for them, and mitigating their future impact |
|
|
Term
|
Definition
| The record of risk information as represented in tables or graphs |
|
|
Term
|
Definition
| An unauthorized wireless access point on a corporate or private network that allows unauthorized individuals to connect to the network |
|
|
Term
|
Definition
| An unknown or unrecognized device that is connected to a network, often with malicious intent |
|
|
Term
|
Definition
| A collection of previously issued patches and hot fixes, usually meant to be applied to one component of a system, such as the web browser or a particular service |
|
|
Term
|
Definition
| The top-most CA in the hierarchy and consequently, the most trusted authority in the hierarchy |
|
|
Term
|
Definition
| Technology that enforces a hardware platform's trusted computing architecture through encryption mechanisms designed to keep data confidential and to prevent tampering |
|
|
Term
|
Definition
| The process of enabling root privileges on an Android device |
|
|
Term
|
Definition
| Software that is intended to take full or partial control of a system at the lowest levels |
|
|
Term
|
Definition
| A simple substitution cipher that replaces a letter with the letter that is 13 letters after it in the alphabet |
|
|
Term
|
Definition
| A scheduling approach used by load balancers to route traffic to devices one by one according to a list |
|
|
Term
|
Definition
| A device that connects multiple networks that use the same protocol |
|
|
Term
|
Definition
| The longest period of time that an organization can tolerate lost data being unrecoverable |
|
|
Term
|
Definition
| The first successful algorithm to be designed for public key encryption. It is named for its designers, Rivest, Shamir, and Adelman |
|
|
Term
|
Definition
| A subscription technology that enables users to subscribe to a "feed" of each website that interests them |
|
|
Term
|
Definition
| The length of time it takes after an event to resume normal business operations and activities |
|
|
Term
|
Definition
| A specialized operating system that uses a more consistent processor scheduler than a standard operating system |
|
|
Term
|
Definition
| A protocol that provides audio and video streaming media over a TCP /IP network |
|
|
Term
| rule-based access control |
|
Definition
| A non-discretionary access control technique that is based on a set of operational rules or restrictions |
|
|
Term
|
Definition
| Source code that is interpreted by an intermediary run time environment that runs the code, rather than the system executing the code directly |
|
|
Term
|
Definition
| A relatively complex key algorithm that when given the key, provides a substitution key in its place |
|
|
Term
|
Definition
| An email encryption standard that adds digital signatures and public key cryptography to traditional MIME communications |
|
|
Term
|
Definition
| A computing method that uses the cloud to provide application services to users |
|
|
Term
|
Definition
| An XML-based data format used to exchange authentication information between a client and a service |
|
|
Term
|
Definition
| An extension to the X.509 certificate standard that enables organizations to configure a certificate's scope to encompass multiple domains |
|
|
Term
|
Definition
| A data disposal method that completely removes all data from a storage medium at the virtual level |
|
|
Term
|
Definition
| A form of wireless transmission that transfers radio signals to and from orbiting satellites to reach long distances |
|
|
Term
|
Definition
| A type of industrial control system that monitors and controls industrial processes such as manufacturing and fabrication, infrastructure processes such as power transmission and distribution, and facility processes such as energy consumption and HVAC systems |
|
|
Term
|
Definition
| the property by which a computing environment is able to gracefully fulfill its ever- increasing resource needs |
|
|
Term
|
Definition
| The process of adding more resources in parallel with existing resources to achieve scale ability |
|
|
Term
|
Definition
| The process of increasing the power of existing resources to achieve scale ability |
|
|
Term
|
Definition
| The phase of the hacking process in which the attacker uses specific tools to determine organization's infrastructure and discover vulnerabilities |
|
|
Term
|
Definition
| A method used by load balancers to determine which devices should have traffic muted to them |
|
|
Term
|
Definition
| A set of rules in a directory service for how objects are created and what the.r characteristics can be |
|
|
Term
|
Definition
| A protocol that is used to securely transfer computer files between a local and a remote host, or between two remote hosts, using SSH |
|
|
Term
|
Definition
| An object attached to a screen that conceals the contents of the screen from certain viewing angles |
|
|
Term
|
Definition
| An inexperienced hacker with limited technical knowledge who relies on automated tools to hack |
|
|
Term
|
Definition
| The process of designing and deploying software from the initial planning stages before the app is deployed, all the way to its obsolescence |
|
|
Term
|
Definition
| A networking implementation that simplifies the process of administrating a network by separating systems that control where traffic is sent from systems that actually forward this traffic to its destination |
|
|
Term
|
Definition
| A computing method that enables clients to take advantage of information, software, infrastructure, and processes provided by a cloud vendor in the specific area of computer security |
|
|
Term
|
Definition
| The phase of the hacking process in which the attacker uses specific tools to determine an Organizations infrastructure & Discover vulnerabilities |
|
|
Term
|
Definition
| A UEFI feature that prevents unwanted processes from executing during the boot operation |
|
|
Term
|
Definition
| A storage device that is encrypted at the hardware level in order to avoid relying on software solutions |
|
|
Term
|
Definition
| A secure version of the File Transfer Protocol that uses a Secure Shell tunnel as an encryption method to transfer, access, and manage files |
|
|
Term
|
Definition
| A version of the Internet Message Access Protocol that uses SSL or TLS to provide secure communications between a mail client and the mail server |
|
|
Term
|
Definition
| A method of implementing LDAP using SSL/TLS encryption |
|
|
Term
|
Definition
| A version of the Post Office Protocol that uses SSL or TLS to provide secure communications between a mail client and the mail server |
|
|
Term
| security architecture review |
|
Definition
| An evaluation of an organization's current security infrastructure model and security measures |
|
|
Term
|
Definition
| The process of testing security controls through a comprehensive set of techniques aimed at exposing any weaknesses or gaps in your tools, technologies, services, and operations |
|
|
Term
|
Definition
| The act of performing an organized technical assessment of the security strengths and weaknesses of a computer system to ensure that the system is in compliance |
|
|
Term
|
Definition
| A conceptual structure for security operations within the organization |
|
|
Term
|
Definition
| A formalized statement that defines how security will be implemented within a particular organization |
|
|
Term
| security through obscurity |
|
Definition
| The practice of attempting to hide the existence of vulnerabilities from others |
|
|
Term
|
Definition
| A type of digital certificate that is owned by the entity that signs it |
|
|
Term
|
Definition
| A concept that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse of powers |
|
|
Term
|
Definition
| A collection of system updates that can include functionality enhancements, new features, and typically all patches, updates, and hot fixes issued up to the point of the release of the service pack |
|
|
Term
|
Definition
| A type of hijacking attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services |
|
|
Term
|
Definition
| A single-use symmetric key used for encrypting all messages in a series of related communications |
|
|
Term
|
Definition
| An early unsecured file transfer protocol that has since been declared obsolete |
|
|
Term
|
Definition
| A hash algorithm modeled after MD5 and considered the stronger of the two. It has multiple versions that produce different sized hash values |
|
|
Term
|
Definition
| An identity federation method that provides single sign-on capabilities and enables websites to make informed authorization decisions for access to protected online resources |
|
|
Term
|
Definition
| The process of developing and implementing additional code between an application and the operating system to enable functionality that would otherwise be unavailable |
|
|
Term
|
Definition
| A human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN |
|
|
Term
|
Definition
| An attack in which an attacker gleans information from the physical implementation of a cryptographic technique and uses that information to analyze and potentially break the implementation |
|
|
Term
|
Definition
| The practice of directly installing an app package on a mobile device instead of downloading it through an app store |
|
|
Term
|
Definition
| A solution that provides real-time or near real time analysis of security alerts generated by network hardware and applications |
|
|
Term
| signature-based monitoring |
|
Definition
| A network monitoring system that uses a predefined set of rules provided by a software vendor or security personnel to identify events that are unacceptable |
|
|
Term
|
Definition
| The collection of information on a location for the purposes of building the most ideal infrastructure |
|
|
Term
|
Definition
| A business agreement that defines what services and support are provided to a client |
|
|
Term
|
Definition
| A sudden, temporary surge in traffic to a website that occurs when another website or other source posts a story that refers visitors to the victim website |
|
|
Term
|
Definition
| The financial loss expected from a single adverse event |
|
|
Term
|
Definition
| A device similar to a credit card that can store authentication information, such as a user's private key, on an embedded microchip |
|
|
Term
|
Definition
| An electronic device, other than a typical computer, that is connected to a network and has some computing properties |
|
|
Term
|
Definition
| A human-based attack where the attacker extracts personal information by using SMS text messages |
|
|
Term
|
Definition
| The state of a virtual machine at a specific point in time |
|
|
Term
|
Definition
| A device or program that monitors network communications on the network wire or across a wireless network and captures data |
|
|
Term
|
Definition
| A network attack that uses a protocol analyzer to gain access to private communications on the network wire or across a wireless network |
|
|
Term
|
Definition
| An application-layer service used to exchange information between network devices |
|
|
Term
|
Definition
| An embedded systems component that consolidates the functionality of a CPU, memory module, and peripherals. Also known as system on chip (SoC) |
|
|
Term
|
Definition
| Any activity where the goal is to use deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines |
|
|
Term
|
Definition
| Any attack that targets software resources, including operating systems, applications, services, protocols, and files |
|
|
Term
|
Definition
| A federally mandated publication of any system of record in the Federal Register |
|
|
Term
|
Definition
| Software instructions, written in a Human readable programming language, that are to be executed by a computer. Access to source code enables a programmer to change how a piece of software functions |
|
|
Term
|
Definition
| An email-based threat that floods the user's inbox with emails that typically carry unsolicited advertising material for products or other spurious content, and which sometimes deliver viruses. It can also be utilized within social networking sites such as Facebook and Twitter |
|
|
Term
|
Definition
| A program that will detect specific words that are commonly used in spam messages |
|
|
Term
|
Definition
| A collection of information that is optimized for data that represents objects contained in a geometric space |
|
|
Term
|
Definition
| An email-based or web-based form of phishing that targets a specific individual or organization |
|
|
Term
|
Definition
| An IM-based attack just like spam but which is propagated through instant messaging instead of through email |
|
|
Term
|
Definition
| A network-based attack where the goal is to pretend to be someone else for the purpose of identity concealment |
|
|
Term
|
Definition
| Surreptitiously installed malware that is intended to track and report the usage of a target system or collect other data the attacker wishes to obtain |
|
|
Term
|
Definition
| A programming and query language common to many large scale database systems. |
|
|
Term
|
Definition
| An attack that injects a database query into the input data directed at a server by accessing the client side of the application |
|
|
Term
|
Definition
| A protocol that provides audio and video streaming media over a TCP /IP network and uses encryption services to uphold the authenticity and integrity of streaming media, as well as to protect against replay attacks |
|
|
Term
|
Definition
| A protocol for secure remote logon and secure transfer of data |
|
|
Term
|
Definition
| A continuous announcement by a WAP that transmits its name so that wireless devices can discover it |
|
|
Term
|
Definition
| A security protocol that uses certificates for authentication and encryption to protect web communication |
|
|
Term
|
Definition
| A hardware interface that helps offload the resource-intensive encryption calculations in SSL/TLS to reduce overhead for a server |
|
|
Term
|
Definition
| An aspect of privilege management that provides users with one-time authentication to multiple resources, servers, or sites |
|
|
Term
|
Definition
| A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet with a PPP header and then with an SSTP header |
|
|
Term
|
Definition
| The process of setting up an environment through which an asset can be quickly and easily deployed for testing purposes |
|
|
Term
|
Definition
| A document that defines how to measure the level of adherence to a policy. |
|
|
Term
| standard operating procedure |
|
Definition
| A collection of procedures that dictate how policy components are implemented |
|
|
Term
|
Definition
| A firewall that tracks the active state of a connection, and can make decisions based on the contents of a network packet as it relates to the state of the connection |
|
|
Term
|
Definition
| A firewall that does not track the active state of a connection as it reaches the firewall |
|
|
Term
|
Definition
| The process of reviewing source code while it is in a static state, i.e., it is not executing |
|
|
Term
|
Definition
| A type of port scan that identifies open ports without completing the three-way handshake |
|
|
Term
|
Definition
| An alternative encryption technique that hides a secret message by enclosing it in an ordinary file |
|
|
Term
|
Definition
| The practice of compartmentalizing different types of data on one or more storage media, such as isolating a mobile device's OS and base apps from the apps and data added by the user |
|
|
Term
|
Definition
| One of a set of pre-compiled database statements that can be used to validate input to a database |
|
|
Term
|
Definition
| A switching protocol that prevents network loops by dynamically disabling links as needed |
|
|
Term
|
Definition
| A relatively fast type of encryption that encrypts data one bit at a time |
|
|
Term
|
Definition
| A software testing method that evaluates how software performs under e.xtreme load |
|
|
Term
|
Definition
| In DNS, a logical division of an organizational domain, such as sales.develetech.com |
|
|
Term
|
Definition
| The division of a large network into smaller logical networks |
|
|
Term
|
Definition
| Any CA below the root CA in the hierarchy |
|
|
Term
|
Definition
| An obfuscation technique where each unit of plaintext is kept in the same sequence when converted to ciphertext, but the actual value of the unit changes |
|
|
Term
|
Definition
| A documented plan that ensures that all key business personnel have one or more designated backups who can perform critical functions when needed |
|
|
Term
|
Definition
| The end-to-end process of supplying, manufacturing, distributing, and finally releasing goods and services to a customer |
|
|
Term
|
Definition
| A device that has multiple network ports and combines multiple physical network segments into a single logical network |
|
|
Term
|
Definition
| A two-way encryption scheme in which encryption and decryption are both pet-formed by the same key. Also known as shared-key encryption |
|
|
Term
|
Definition
| A collection of information that uses an individual's name or an identifying number, symbol, or other identification Scheme |
|
|
Term
|
Definition
| A discussion-based session where disaster recovery team members discuss their roles in emergency situations, as well as their responses to particular situations |
|
|
Term
|
Definition
| A remote access protocol that provides centralized authentication and authorization services for remote users |
|
|
Term
|
Definition
| Cisco's extension to the TACACS protocol that provides multi-factor authentication |
|
|
Term
|
Definition
| A human-based attack where an attacker enters a secure area by following a legitimate employee without the employee's knowledge or permission |
|
|
Term
|
Definition
| A type of software attack where an attacker gains access to a remote host and takes control of the system |
|
|
Term
|
Definition
| The hardware, firmware, and software components of a computer system that implement the security policy of a system |
|
|
Term
|
Definition
| A non-proprietary, mutable network protocol suite that enables computers to communicate over all types of networks |
|
|
Term
|
Definition
| Hardware or software installations that are implemented to monitor and prevent threats and attacks to computer systems and services |
|
|
Term
|
Definition
| Technology that provides voice and video communications through devices over a distance |
|
|
Term
|
Definition
| A network protocol that enables a client to initiate remote command access to a host over TCP/ IP |
|
|
Term
|
Definition
| The process of sharing a wireless Internet connection with multiple devices |
|
|
Term
|
Definition
| An insecure, limited version of FTP used primarily to automate the process of configuring boot files between computers |
|
|
Term
|
Definition
| Any event or action that could potentially cause damage to an asset |
|
|
Term
|
Definition
| An entity that is partially or wholly responsible for an incident that affects or has the potential to affec organization's security |
|
|
Term
|
Definition
| The process by which a TCP connection is completed between two hosts, where a host sends a SYN packet to the host it needs to communicate with, that host sends a SYNĀ ACK packet back, and the originating host sends an ACK packet to complete the connection |
|
|
Term
|
Definition
| A security protocol created by the IEEE 802.1 li task group to replace WEP |
|
|
Term
|
Definition
| (Transport Layer Security) A security protocol that uses certificates and public key cryptography for mutual authentication and data encryption over a TCP /IP connection |
|
|
Term
|
Definition
| A physical or virtual object that stores authentication information |
|
|
Term
|
Definition
| The operating system component of the TCB that protects the resources from applications |
|
|
Term
|
Definition
| (timed HMAC-based one-time password) An improvement on HOTP that forces one-time passwords to expire after a short period of time |
|
|
Term
|
Definition
| A specification that includes the use of cryptoprocessors to create a secure computing environment |
|
|
Term
|
Definition
| A principle in which one entity implicitly trusts another entity because both of them trust the same third party |
|
|
Term
|
Definition
| A type of malware that hides itself on an infected system and can cause damage to a system or give an attacker a platform for monitoring and/or controlling a system |
|
|
Term
|
Definition
| A single CA or group of CAs that work together to issue digital certificates |
|
|
Term
|
Definition
| A data-transport technique in which a data packet is encrypted and encapsulated in another data packet in order to conceal the info1mation of the packet inside |
|
|
Term
|
Definition
| A symmetric key block cipher, similar to Blowfish, consisting of a block size of 128 bits and key sizes up to 256 bits |
|
|
Term
|
Definition
| An attack in which an attacker registers a domain name with a common misspelling of an existing domain, so that a user who misspells a URL they enter into a browser is taken to the attacker's website |
|
|
Term
|
Definition
| A firmware interface that initializes hardware for an operating system boot. |
|
|
Term
|
Definition
| An attack in which an attacker registers a domain name with a common misspelling of an existing domain, so that a user who misspells a URL they enter into a browser is taken to the attacker's website |
|
|
Term
|
Definition
| An external media solution where two devices connect over USB in a master/slave configuration |
|
|
Term
|
Definition
| The practice of centralizing various security techniques into a single appliance |
|
|
Term
|
Definition
| A VM that runs a desktop operating system |
|
|
Term
|
Definition
| A virtualization implementation that separates the personal computing environment from a user's physical computer |
|
|
Term
|
Definition
| The practice of ensuring that the assets that make up a project are closely managed when it comes time to make changes |
|
|
Term
|
Definition
| The practice of ensuring that the assets that make up a project are closely managed when it comes time to make changes |
|
|
Term
|
Definition
| The process of creating a simulation of a computing environment, where ilie virtualized system can simulate the hardware, operating system, and applications of a typical computer wiiliout being a separate physical computer |
|
|
Term
|
Definition
| A self-replicating piece of malicious code that spreads from computer to computer by attaching itself to different files |
|
|
Term
|
Definition
| A human-based attack where the attacker extracts information while speaking over the phone or leveraging IPĀ based voice messaging services (VoIP). |
|
|
Term
|
Definition
| A logical method of segmenting a network at the Data Link layer layer 2) of the OSI model |
|
|
Term
|
Definition
| A virtualized computer that consists of an operating system and applications that run in a virtual environment that simulates dedicated physical hardware |
|
|
Term
|
Definition
| An exploit where an attacker executes code in a VM that allows an application mnning on the VM to "escape" the virtual environment and interact directly with the hypervisor |
|
|
Term
|
Definition
| A situation where the number of virtual machines exceeds the organization's ability to control or manage all of those virtual machines |
|
|
Term
|
Definition
| A mobile deployment model that allows employees' devices to connect to VMs that run mobile operating systems so that they can perform work tasks in a controlled environment |
|
|
Term
|
Definition
| A collection of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of VMs over the course of their existence |
|
|
Term
|
Definition
| A term used for a technology that enables telephony communications over a network by using the IP protocol |
|
|
Term
|
Definition
| A method of extending a private network by tunneling though a public network, such as the Internet |
|
|
Term
|
Definition
| A single device that incorporates advanced encryption and authentication methods in order to handle a large number of VPN tunnels |
|
|
Term
|
Definition
| Any condition that leaves an information system open to harm |
|
|
Term
|
Definition
| A security assessment that evaluates a system's security and its ability to meet compliance requirements based on the configuration state of the system |
|
|
Term
|
Definition
| A firewall that is deployed to secure an organization's web applications and other application-based infrastructure from attackers |
|
|
Term
|
Definition
| A wireless threat where the attacker uses symbols to mark up a sidewalk or wall to indicate the presence and status of a nearby wireless network |
|
|
Term
|
Definition
| A wireless threat where the attacker searches for instances of wireless LAN networks while in motion in a motor vehicle, by using wireless tracking devices like mobile phones, smartphones, tablets, or laptops |
|
|
Term
|
Definition
| A wireless threat where the attacker searches for instances of wireless LAN networks while on foot, by using wireless tracking devices like mobile phones, smartphones, tablets, or laptops. Typically used in high-density areas such as malls, hotels, and city centers |
|
|
Term
|
Definition
| A location that is dormant or performs nonĀ critical functions under normal conditions, but which can be rapidly converted to a key operations site if needed |
|
|
Term
|
Definition
| A software development model where the phases of the SDLC cascade so that each phase will start only when all tasks identified in the previous phase are complete |
|
|
Term
|
Definition
| An attack in which an attacker targets a specific group, discovers which websites that group frequents, then injects those sites with malware so that visitors to the sites will become infected |
|
|
Term
|
Definition
| An application attack that focuses on those applications that run in web browsers |
|
|
Term
|
Definition
| A deprecated protocol that provides 64-bit, 128-bit, and 256- bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols |
|
|
Term
|
Definition
| A form of spear phishing that targets particularly wealthy individuals or organizations |
|
|
Term
|
Definition
| The practice of allowing approved progran1s to run on a computer, computer network, or mobile device |
|
|
Term
|
Definition
| Technology that enables two mobile devices to connect to each other without a wireless access point |
|
|
Term
|
Definition
| A type of NIDS that scans the radio frequency spectrum for possible threats to the wireless network, primarily rogue access points |
|
|
Term
|
Definition
| A type of digital certificate that enables organizations to configure a certificate's scope to encompass multiple subdomains |
|
|
Term
|
Definition
| An active, inline security device that monitors suspicious network and/or system traffic on a wireless network and reacts in real time to block it |
|
|
Term
| wireless disassociation attack |
|
Definition
| A type of wireless attack where an attacker spoofs the MAC address of a wireless access point to force a target device to try and reĀ associate with the WAP. |
|
|
Term
|
Definition
| A self-replicating piece of malicious code that spreads from computer to computer without attaching to different files |
|
|
Term
|
Definition
| A storage medium used in SIEM to maintain the integrity of the security data being compiled |
|
|
Term
|
Definition
| A wireless encryption protocol that generates a 128-bit key for each packet sent. Superseded by WPA2 |
|
|
Term
|
Definition
| An improvement to the WPA protocol that implements all mandatory components of the 802.1li standard, including Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption for increased security, and a 128- bit encryption key |
|
|
Term
|
Definition
| An insecure feature of WPA and WPA2 that allows enrollment in a wireless network based on an 8-digit PIN |
|
|
Term
|
Definition
| A standard for formatting digital certificates that defines the structure of a certificate with the information that was provided in a CSR |
|
|
Term
|
Definition
| A widely adopted markup language used in many documents, websites, and web applications |
|
|
Term
|
Definition
| An application attack that injects corrupted XML query data so that an attacker can gain access to the XML data structure and input malicious code or read private data |
|
|
Term
|
Definition
| An operation that outputs to true only if one input is true and the other input is false |
|
|
Term
|
Definition
| (cross-site scripting) A web application attack where the attacker takes advantage of scripting and input validation vulnerabilities in an interactive website to attack legitimate users |
|
|
Term
|
Definition
| An extension to the original TACACS protocol |
|
|
Term
|
Definition
| An application attack that occurs immediately after a vulnerability is identified, when the security level is at its lowest |
|
|
Term
|
Definition
| A software vulnerability that a malicious user is able to exploit before the vulnerability is publicly known or known to the developers, and before those developers have a chance to issue a fix |
|
|
Term
|
Definition
| A computer that has been infected with a bot and is being used by an attacker to mount an attack. Also called a drone |
|
|
Term
| software development lifecycle |
|
Definition
| The process of designing and deploying software from the initial planning stages before the app is deployed, all the way to its obsolescence |
|
|
Term
| wireless intrusion detection system |
|
Definition
| A type of NIDS that scans the radio frequency spectrum for possible threats to the wireless network, primarily rogue access points |
|
|
Term
|
Definition
| A policy that defines the rules for user behavior with regard to using organizational resources. |
|
|
Term
|
Definition
| On a router, a list that is used to filter network traffic and implement anti-spoofing measures. In a DAC access control scheme, a list that is associated with each object, specifying the subjects that can access the object and their levels of access. |
|
|
Term
| address resolution protocol |
|
Definition
| The mechanism by which individual hardware MAC addresses are matched to an IP address on a network. |
|
|
Term
| advance persistent threat |
|
Definition
| A threat that uses multiple attack vectors to gain unauthorized access to sensitive resources and then maintain that access for a long period of time. |
|
|
Term
| advanced encryption standarf |
|
Definition
| A symmetric 128-, 192-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES. |
|
|
Term
|
Definition
| An analysis of events that can provide insight into how to improve response processes in the future. |
|
|
Term
| annual rate of occurrence |
|
Definition
| How many times per year a particular loss is expected to occur. |
|
|
Term
|
Definition
| The total cost of a risk to an organization on an annual basis. |
|
|
Term
| attribute based access control |
|
Definition
| An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted. |
|
|
Term
| authentication authroization and accounting |
|
Definition
| A security concept where a centralized platform verifies object identification, ensures the object is assigned relevant permissions, and then logs these actions to create an audit trail. |
|
|
Term
|
Definition
| An IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks. |
|
|
Term
|
Definition
| A mobile deployment model that describes how employees can use their own personal mobile devices to get work done, if they so choose. |
|
|
Term
|
Definition
| A policy that describes and ratifies the organization's overall business continuity strategy. |
|
|
Term
|
Definition
| A systematic activity that identifies organizational risks and determines their effect on ongoing, missionĀ critical operations. |
|
|
Term
| business partnership agreement |
|
Definition
| A business agreement that defines how a partnership between organizations will be conducted, and what is expected of each organization. |
|
|
Term
|
Definition
| A server that can issue digital certificates and the associated public/ private key pairs. |
|
|
Term
| certificate revocation list |
|
Definition
| A list of certificates that were revoked before their expiration dat |
|
|
Term
| certificate signing request |
|
Definition
| A message sent to a certificate authority in which a resource applies for a certificate |
|
|
Term
| challange handshake authentication protocol |
|
Definition
| An encrypted remote access authentication method that enables connections from any authentication method requested by the server, except for PAP and SPAP unencrypted authentication. |
|
|
Term
|
Definition
| A mobile deployment model that allows employees to select a mobile device from a list of accepted devices to use for work purposes. |
|
|
Term
|
Definition
| An encryption mode of operation where an exclusive or (XOR) is applied to the first plaintext block. |
|
|
Term
|
Definition
| An encryption mode of operation where an initialization vector (IV) is encrypted before its result is XORed with the previous plaintext block. |
|
|
Term
|
Definition
| The use of surveillance cameras that do not openly broadcast signals. |
|
|
Term
| clous access security broker |
|
Definition
| A service offered by some SECaaS vendors to establish security gateways sitting between the organization's onĀ premises network and the cloud network, ensuring that traffic both ways complies with policy. |
|
|
Term
|
Definition
| A smart card that provides certificate-based authentication and supports two-factor authentication |
|
|
Term
|
Definition
| A set of standards developed by a group of governments worlcing together to create a baseline of security assurance for a trusted operating system (TOS). |
|
|
Term
| confidentiality, intergrity and availability triad |
|
Definition
| The three basic principles of security control and management: confidentiality, integrity, & availability. Also known as the information security triad or triple. |
|
|
Term
| control objectives for information and related technology version 5 |
|
Definition
| A framework for IT management and governance created by ISACA |
|
|
Term
|
Definition
|
|
Term
| Corporate owner personally enabled |
|
Definition
| A mobile deployment model that allows the organization to choose which devices they want employees to work with, while still allowing the employee some freedom to use the device for personal activities |
|
|
Term
| counter mode with cipher block chaining message authentication code protocol |
|
Definition
| An AES cipher-based encryption protocol used in WPA2. |
|
|
Term
|
Definition
| An encryption mode of operation where a numerical counter value is used to create a constantly changing IV |
|
|
Term
|
Definition
| An encryption mode of operation where a numerical counter value is used to create a constantly changing IV |
|
|
Term
|
Definition
| A metric for biometric devices that describes the threshold values of the FAR and FRR. A low CER signifies a highly accurate biometric system. |
|
|
Term
|
Definition
| A web application attack where the attacker takes advantage of scripting and input validation vulnerabilities in an interactive website to attack legitimate users |
|
|
Term
| cross site request forgery |
|
Definition
| A web application attack that takes advantage of the trust established between an authorized user of a website & the website itself |
|
|
Term
| cryptographic service provider |
|
Definition
| A cryptographic module that implements Microsoft's CryptoAPI |
|
|
Term
|
Definition
| A symmetric encryption algorithm that encrypts data in 64- bit blocks using a 56-bit key, with 8 bits used for parity |
|
|
Term
| data execution prevention |
|
Definition
| A Windows feature that prevents malicious code in memory from executing |
|
|
Term
| data loss/leak prevention |
|
Definition
| A software solution that detects and prevents sensitive information in a system or network &om being stolen or otherwise falling into the wrong hands |
|
|
Term
|
Definition
| A small section of a private network that is located behind one firewall or between two firewalls and made available for public access |
|
|
Term
|
Definition
| A network-based attack where the attacker disables systems that provide network services by consuming a network link's available bandwidth, consuming a single system's available resources, or exploiting programming flaws in an application or operating system |
|
|
Term
|
Definition
| A cryptographic protocol that provides for secure key exchange |
|
|
Term
|
Definition
| A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange by using ephemeral keys. |
|
|
Term
| digital signature algorithm |
|
Definition
| A public key encryption standard used for digital signatures that provides authentication and integrity verification for messages |
|
|
Term
|
Definition
| A policy that describes and ratifies the organization's disaster recovery strategy |
|
|
Term
| discretionary access control |
|
Definition
| In this, access is controlled based on a user's identity. Objects are configured with a list of users who are allowed access to them. An administrator has the discretion to place the user on the list or not. If a user i-s on the list, the user is granted access; if the user is not on the list, access is denied |
|
|
Term
| domain name security extension |
|
Definition
| A security protocol that provides authentication of DNS data and upholds DNS data integrity |
|
|
Term
|
Definition
| The service that maps names to IP addresses on most TCP/IP networks, including the Internet |
|
|
Term
|
Definition
| A type of digital certificate that proves that some entity has control over a particular domain name. Considered to be weaker than EV |
|
|
Term
| dynamic host configuration protocol |
|
Definition
| A protocol used to automatically assign IP addressing information to IP network computers. |
|
|
Term
| EAP-flexible authentication via secure tunneling |
|
Definition
| An EAP method that is expected to address the shortcomings of LEAP. |
|
|
Term
| EAP-transport layer security |
|
Definition
| An EAP method that requires a client-side certificate for authentication using SSL/TLS. |
|
|
Term
| electro magnetic interference |
|
Definition
| A disruption of electrical current that occw:s when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit |
|
|
Term
|
Definition
| A short burst of electrical interference caused by an abrupt and rapid acceleration of charged particles, which can short-circuit and damage electronic components |
|
|
Term
|
Definition
| An encryption mode of operation where each plaintext block is encrypted with the san1e key |
|
|
Term
| elliptic curve cryptography |
|
Definition
| An asymmetric encryption technique that leverages the algebraic structures of elliptic curves over finite fields |
|
|
Term
| elliptic curve diffie - hellman ephemeral |
|
Definition
| (Elliptic Curve Diffie-Hellman Ephemeral) A cryptographic protocol that is based on DiffieĀ Hellman and that provides for secure key exchange by using ephemeral keys and elliptic curve cryptography |
|
|
Term
| encapsulation security yaload |
|
Definition
| An IPSec protocol that provides authentication for the origin of transmitted data, integrity and protection against replay attacks, and encryption to support the confidentiality of transmitted data |
|
|
Term
|
Definition
| Micrnsoft Windows NTFS-based public key encryption |
|
|
Term
| enhanced interior gateway routing protocol |
|
Definition
| An improvement over IGRP that indudes features that support VLSM and classful and classless subnet masks |
|
|
Term
|
Definition
| see CER (crossover error rate) A metric for biometric devices that describes the threshold values of the FAR and FRR. A low CER signifies a highly accurate biometric system |
|
|
Term
| evaluation assurance level |
|
Definition
| A rating from 1 to 7 that states the level of secure features offered by an operating system as defined by the Common Criteria (CC) |
|
|
Term
|
Definition
| An operation that outputs to true onif one input is true and the other input is false |
|
|
Term
|
Definition
| Considered to be stronger than DV |
|
|
Term
| extensible authentication protocol |
|
Definition
| A wireless authentication protocol that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication |
|
|
Term
| Extensible Markup language |
|
Definition
| A widely adopted markup language used in many documents, websites, and web applications |
|
|
Term
|
Definition
| A metric for biometric devices that describes the percentage of authorized users who were incorrectly rejected by a biometric system |
|
|
Term
|
Definition
| A metric for biometric devices that describes the percentage of unauthorized users who were incorrectly authenticated by a biometric system |
|
|
Term
|
Definition
| A communications protocol that enables the transfer of files between a user's workstation and a remote host |
|
|
Term
| file transfer protocol secure |
|
Definition
| A protocol that combines the use of FTP with additional support for TLS and SSL |
|
|
Term
| file transport protocol / secure socket layer |
|
Definition
| A protocol that combines the use of FTP with additional support for TLS and SSL |
|
|
Term
| file transport protocol over secure shell |
|
Definition
| A secure version of the File Transfer Protocol that uses a Secure Shell tunnel as an encryption method to transfer, access, and manage files |
|
|
Term
|
Definition
| A storage technology that encrypts an entire storage drive at the hardware level |
|
|
Term
|
Definition
| An encryption mode of operation that adds authentication to the standard encryption services of a cipher mode |
|
|
Term
|
Definition
| A free open-soucce version of PG P that provides the equivalent ennyption and authentication services |
|
|
Term
|
Definition
| A physical device that provides root of trust capabilities |
|
|
Term
| hash-based message authentication code |
|
Definition
| A method used to verify both the integrity and authenticity of a message by combining nyptographic hash functions, such as MDS or SHA -1, with a secret key |
|
|
Term
| heating ventilation and air conditioning |
|
Definition
| A system that controls the air quality and flow inside a building |
|
|
Term
| HMAC-base one time password |
|
Definition
| An algorithm that generates a one-time password using a hash-based authentication code to verify the authenticity of the message |
|
|
Term
| host -based instrusion detection system |
|
Definition
| A type of IDS that monitors a computer system for unexpected behavior or drastic changes to the system's state |
|
|
Term
| host-based intrusion prevention system |
|
Definition
| A type of IPS that monitors a computer system for unexpected behavior or drastic changes to ilie system's state and reacts in real time to block it |
|
|
Term
| hyper text transfer protocol secure |
|
Definition
| A secure version of HTTP that provides a secure connection between a web browser and a server |
|
|
Term
| hyper text transfer protocol |
|
Definition
| A protocol that defines the interaction between a web server and a browser |
|
|
Term
| identity and access management |
|
Definition
| A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications |
|
|
Term
|
Definition
| A document or series of documents that describe procedures for detecting, responding to, and minimizing the effects of security incidents |
|
|
Term
| industrial control system |
|
Definition
| A networked system that controls critical infrastructure such as water, electrical, transportation, and telecommunication services |
|
|
Term
| information technology infrastructure library |
|
Definition
| A comprehensive IT management structure derived from recommendations originally developed by the United Kingdom Government's Central Computer and Telecommunications Agency (CCTA) |
|
|
Term
| infrastructure as a service |
|
Definition
| A computing method that uses the cloud to provide any or all infrastructure needs |
|
|
Term
|
Definition
| A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption |
|
|
Term
|
Definition
| A type of communication service which involves a private dialogue between two persons via instant text-based messages over the Internet |
|
|
Term
| institute of electrical and electronicsengineers |
|
Definition
| A professional association of electrical and electronics engineers that develops industry standards for a variety of technologies |
|
|
Term
| interconnection security agreement |
|
Definition
| A business agreement that focuses on ensuring security between organizations in a partnership |
|
|
Term
| Interior gateway routing protocol |
|
Definition
| A distance-vector routing protocol developed by Cisco as an improvement over RIP and RIP v2. |
|
|
Term
| Internet message access protocol over secure socket layert/tls |
|
Definition
| a version of the internet Message Access Protocol that uses SSL or TLS to provide secure communication between mail client and the mail server |
|
|
Term
| internet message access protocol secure |
|
Definition
| ) a version of the internet Message Access Protocol that uses SSL or TLS to provide secure communication between mail client and the mail server |
|
|
Term
| internet message access protocol |
|
Definition
| A protocol used to retrieve email messages and folders from a mail server |
|
|
Term
| internet message control protocol |
|
Definition
| An IP network service that reports on connections between two hosts |
|
|
Term
|
Definition
| A group of objects (electronic or not) that are connected to the wider Internet by using embedded electronic components |
|
|
Term
| internet protocol security |
|
Definition
| A set of open, non-proprietary standards that are used to secure data through authentication and encryption as the data travels across the network or the Internet |
|
|
Term
| intrusion detection system |
|
Definition
| A software and/or hardware system that scans, audits, and monitors the security infrastructure for signs of attacks in progress |
|
|
Term
| Intrusion prevention system |
|
Definition
| An inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it |
|
|
Term
|
Definition
| A cryptographic attack where the attacker has access to plaintext and the corresponding ciphertext, and tries to derive the correlation between them |
|
|
Term
| layering 2 tunneling oprotocol |
|
Definition
| The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP, Frame Relay, or ATM |
|
|
Term
|
Definition
| An analysis of events that can provide insight into how to improve response processes in the future |
|
|
Term
| lightweight directory access protocol secure |
|
Definition
| A method of implementing LDAP using SSL/TLS encryption |
|
|
Term
| lightweight directory access protocol |
|
Definition
| A simple network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information |
|
|
Term
| lightweight extensible authentication protocol |
|
Definition
| Cisco Systems' proprietary EAP implementation |
|
|
Term
|
Definition
| Data stored on a user's computer after visiting a website that uses Adobe Flash Player. These can be used to track a user's activity. |
|
|
Term
|
Definition
| A mathematical control that takes into account the total number of key recovery agents (N) along with the number of agents required to perform a key recovery |
|
|
Term
|
Definition
| A system in which objects (files and other resources) are assigned security labels of varying levels, depending on the object's sensitivity. Users are assigned a security level or clearance, and when they try to access an object, their clearance is compared to the object's security label. If there is a matcl1, the user can access the object; if there is no match, the user is denied access. |
|
|
Term
| maximum tolerable down time |
|
Definition
| The longest period of time a business can be inoperable without causing irrevocable business failure |
|
|
Term
| mean time between failure |
|
Definition
| The rating on a device or component that predicts the expected time between failures |
|
|
Term
|
Definition
| The average time a device or component is expected to be in operation |
|
|
Term
| mean time to repair/replace/recover |
|
Definition
| (mean time to repair/replace/recover) The average time taken for a device or component to be repaired, replaced, or otherwise recover from a failure |
|
|
Term
| media access control address spoofing |
|
Definition
| An attack in which an attacker falsifies the factory-assigned MAC address of a device's network interface |
|
|
Term
| media access control address |
|
Definition
| A unique physical address assigned to each network adapter board at the time of its manufacture |
|
|
Term
| media access control filtering |
|
Definition
| The security technique of allowing or denying specific mac addresses from connecting to a network device. |
|
|
Term
| memorandum of understanding |
|
Definition
| A non-legally binding business agreement that defines a common goal that cooperating entities work toward without direct monetary compensation |
|
|
Term
|
Definition
| A hash algorithm, based on RFC 1320, that produces a 128-bit hash value and is used in message integrity checks for data authentication |
|
|
Term
|
Definition
| A hash algorithm, based on RFC 1321, that produces a 128-bit hash value and is used in IPSec policies for data authentication |
|
|
Term
| miscorsoft chanllege handshake authentication protocol |
|
Definition
| A protocol that strengthens the password authentication provided by Protected Extensible Authentication Protocol (PEAP) |
|
|
Term
|
Definition
| The process of tracking, controlling, and securing an organization's mobile infrastructure |
|
|
Term
| multipurpose internet management extensiion |
|
Definition
| An extension of SMTP that enables the exchange of audio, video, images, applications, and other data formats through email |
|
|
Term
|
Definition
| A mobile device communication standard that operates at very short range, often through physical contact |
|
|
Term
| netowrk intrusion detection systems |
|
Definition
| ) A system that uses passive hardware sensors to monitor traffic on a specific segment of the network |
|
|
Term
| netowrk intrusion preventive system |
|
Definition
| An active, inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it |
|
|
Term
|
Definition
| (Network Access Control) The collection of protocols, policies, and hardware that govern access of devices connecting to a network |
|
|
Term
|
Definition
| A RADIUS server configUiation that uses a centralized server and clients |
|
|
Term
| network addrss translation |
|
Definition
| A simple form of Internet security that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-mutable addresses internally |
|
|
Term
| network basic input output system |
|
Definition
| A service that enables applications to properly communicate over different computers in a network |
|
|
Term
|
Definition
| A challenge-response authentication protocol created by Microsoft for use in its products |
|
|
Term
|
Definition
| An Internet protocol that enables synchronization of device clock times in a network of devices by exchanging time signals |
|
|
Term
|
Definition
| A contract that states that an individual will not share certain sensitive infonnation to outside parties under penalty of law |
|
|
Term
| nternational organization for standardization/international electrotechnical comminssion 27001 |
|
Definition
| A standard model for information systems management practices created by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) |
|
|
Term
|
Definition
| A series of numbers, separated by periods, that describe the identity of the owner of a digital certificate |
|
|
Term
|
Definition
| A password that is generated for use in one specific session and becomes invalid after the session ends |
|
|
Term
| online certificate status protocol |
|
Definition
| An HTTPĀ based alternative to a certificate revocation list that checks the status of certificates |
|
|
Term
|
Definition
| A token-based authorization protocol that is often used in conjunction with OpenID |
|
|
Term
|
Definition
| Information that is legally collected from publicly available origins |
|
|
Term
|
Definition
| An encryption mode of operation where the result of the encrypted IV is fed back to the subsequent operation |
|
|
Term
| password authentication protocol |
|
Definition
| A -remote access authentication service that sends user IDs and passwords as cleartext |
|
|
Term
| password-based key derivation function 2 |
|
Definition
| A key derivation function used in key stretclung to make potentially weak cryptographic keys such as passwords less susceptible to brute force attacks |
|
|
Term
| pen systems interconnection model |
|
Definition
| A method of abstracting how different layers of a network structure interact with one another |
|
|
Term
|
Definition
| A characteristic of session encryption that ensures if a key used during a certain session is compromised, it should not affect data previously encrypted by that key |
|
|
Term
| personal indentity verification |
|
Definition
| A smart card that meets the standards for FIPS 201, in that it is resistant to tampering and provides quick electronic authentication of the card's owner |
|
|
Term
| personally indentifiable information |
|
Definition
| The pieces of information that a company uses or prefers to use to identify or contact an employee or other individual |
|
|
Term
|
Definition
| A computing method that uses the cloud to provide any platformĀ type services. |
|
|
Term
|
Definition
| The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links |
|
|
Term
| point to point tunneling protocol |
|
Definition
| A VPN protocol that is an extension of the PPP remote access protocol |
|
|
Term
| post office protocol 3 secure |
|
Definition
| a versionof the Post Office Protocol that uses SSL ot TLS to provide secure communications |
|
|
Term
|
Definition
| A protocol used to retrieve email from a mailbox on the mail server |
|
|
Term
|
Definition
| A string of text that a VPN or other network service expects to receive prior to any other credentials. In the context of WPA/2-Personal, the key is generated from the wireless password |
|
|
Term
|
Definition
| A method of securing emails created to prevent attackers from intercepting and manipulating email and attachments by encrypting and digitally signing the contents of the email using public key cryptography |
|
|
Term
| privacy impact assessment |
|
Definition
| A tool for identifying and analyzing risks to privacy during the development life cycle of a program or system |
|
|
Term
| privacy threshold analysis/ assessment |
|
Definition
| A document used to determine when a PIA is required |
|
|
Term
| propagating/plaintext chipher block chaining |
|
Definition
| A encryption mode of operation in which each plaintext block is XORed with the previous plaintext and ciphertext blocks |
|
|
Term
| protected exstensible authentication protocol |
|
Definition
| Similar to EAP-TLS, PEAP is an open standard developed by a coalition made up of Cisco Systems, Microsoft, and RSA Security |
|
|
Term
| psuedo-randon number generator |
|
Definition
| The process by which an algorithm produces numbers that approximate randomness without being truly random |
|
|
Term
| public key infrastructure |
|
Definition
| A system that is composed of a CA, certificates, software, services, and other ci-yptographic components, for the purpose of enabling authenticity and validation of data and/or entities |
|
|
Term
| RACE integrity primitives evaluation message digest |
|
Definition
| A message digest algorithm that is based on the design principles used in MD4 |
|
|
Term
| radio frequency indentification |
|
Definition
| A technology that uses electromagnetic fields to automatically identify and track tags or chips that are affixed to selected objects and that store information about the objects |
|
|
Term
| real time operating system |
|
Definition
| A specialized operating system that uses a more consistent processor scheduler than a standard operating system |
|
|
Term
| real time transfer protocol |
|
Definition
| A protocol that provides audio and video streaming media over a TCP /IP network |
|
|
Term
|
Definition
| The longest period of time that an organization can tolerate lost data being unrecoverable |
|
|
Term
| redundant araary of disks |
|
Definition
| A set of vendor-independent specifications that support redundancy and fault tolerance for configurations on multiple-device storage systems |
|
|
Term
|
Definition
| An authority in a PKI that processes requests for digital certificates from users |
|
|
Term
|
Definition
| A specialized Trojan horse that specifically aims to provide an attacker with unauthorized access to or control of a target computer |
|
|
Term
| remote authetication dial-in service |
|
Definition
| A standard protocol for providing centralized authentication and authorization services for remote users |
|
|
Term
|
Definition
| The length of time it takes after an event to resume normal business operations and activities |
|
|
Term
|
Definition
| A subscription technology that enables users to subscribe to a "feed" of each website that interests them |
|
|
Term
|
Definition
| A series of variable key-length symmetric encryption algorithms developed by Ronald Rivest |
|
|
Term
| role-based access control |
|
Definition
| A system in which access is controlled based on a user's role. Users are assigned to roles, and network objects are configured to allow access only to specific roles. Roles are created independently of user accounts |
|
|
Term
|
Definition
| A simple substitution cipher that replaces a letter with the letter that is 13 letters after it in the alphabet |
|
|
Term
| routing information protocol |
|
Definition
| A routing protocol that configures routers to periodically broadcast their entire routing tables. RIP routers broadcast their tables regardless of whether or not any changes have occurred on the network |
|
|
Term
|
Definition
| A form of wireless transmission that transfers radio signals to and from orbiting satellites to reach long distances |
|
|
Term
|
Definition
| A protocol that is used to securely transfer computer files between a local and a remote host, or between two remote hosts, using SSH |
|
|
Term
|
Definition
| A hash algorithm modeled after MD5 and considered the stronger of the two. It has multiple versions that prnduce different sized hash values |
|
|
Term
| secure multipurpose internet mail extension |
|
Definition
| An email encryption standard that adds digital signatures and public key cryptography to traditional MIME communications |
|
|
Term
| secure real time protocol |
|
Definition
| A protocol that provides audio and video streaming media over a TCP /IP network and uses encryption services to uphold the authenticity and integrity of streaming media, as well as to protect against replay attacks |
|
|
Term
|
Definition
| A protocol for secure remote logon and secure transfer of data |
|
|
Term
|
Definition
| A security protocol that uses certificates for authentication and encryption to protect web communication |
|
|
Term
| secure socket tunneling protocol |
|
Definition
| A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet with a PPP header and then with an SSTP header |
|
|
Term
|
Definition
| A computing method that enables clients to take advantage of information, software, infrastructure, and processes provided by a cloud vendor in the specific area of computer security |
|
|
Term
| security assertion markup language |
|
Definition
| An XML-based data format used to exchange authentication information between a client and a service |
|
|
Term
| security information and event management |
|
Definition
| A solution that provides real-time or near realĀ time analysis of security alerts generated by network hardware and applications |
|
|
Term
|
Definition
| A storage device that is encrypted at the hardware level in order to avoid relying on software solutions |
|
|
Term
|
Definition
| A business agreement that defines what services and support are provided to a client |
|
|
Term
| service set identifier broadcast |
|
Definition
| A continuous announcement by a WAP that transmits its name so that wireless devices can discover it |
|
|
Term
| simple file transfer protocol |
|
Definition
| An early unsecured file transfer protocol that has since been declared obsolete |
|
|
Term
| simple network management protocol |
|
Definition
| An application-layer service used to exchange information between network devices |
|
|
Term
|
Definition
| The financial loss expected from a single adverse event |
|
|
Term
|
Definition
| An aspect of privilege management that provides users with one-time authentication to multiple resources, servers, or sites |
|
|
Term
|
Definition
| (Software as a Service) A computing method that uses the cloud to provide application services to users |
|
|
Term
| software defined netowrking |
|
Definition
| A networking implementation that simplifies the process of administrating a network by separating systems that control where traffic is sent from systems that actually forward this traffic to its destination |
|
|
Term
|
Definition
| A switching protocol that prevents network loops by dynamically disabling links as needed |
|
|
Term
| structured query language |
|
Definition
| A programming and query language common to many largeĀ scale database systems. |
|
|
Term
|
Definition
| An extension to the X.509 certificate standard that enables organizations to configure a certificate's scope to encompass multiple domains |
|
|
Term
| supervisory control and data acquisitions |
|
Definition
| A type of industrial control system that monitors and controls industrial prncesses such as manufacturing and fabrication, infrastructure processes such as power transmission and distribution, and facility processes such as energy consumption and HVAC systems |
|
|
Term
|
Definition
| A federally mandated publication of any system of record in the Federal Register |
|
|
Term
|
Definition
| An embedded systems component that consolidates the functionality of a CPU, memory module, and peripherals. Also known as system on chip (SoC) |
|
|
Term
| temporal key integrity protocol |
|
Definition
| A security protocol created by the IEEE 802.1 li task group to replace WEP |
|
|
Term
| terminal access controller access control system |
|
Definition
| A remote access protocol that provides centralized authentication and authorization services for remote users |
|
|
Term
| terminal access controller access control system extension |
|
Definition
| Cisco's extension to the TACACS protocol that provides multi-factor authentication |
|
|
Term
| timed HMAC (based) on-time password |
|
Definition
| An improvement on HOTP that forces one-time passwords to expire after a short period of time |
|
|
Term
| transmission control protocol/internet protocol |
|
Definition
| A non-proprietarry, mutable network protocol suite that enables computers to communicate over all types of networks |
|
|
Term
|
Definition
| A security protocol that uses certificates and public key cryptography for mutual authentication and data encryption over a TCP /IP connection |
|
|
Term
| trivial file transfer protocol |
|
Definition
| An insecure, limited version of FTP used primarily to automate the process of configuring boot files between computers |
|
|
Term
|
Definition
| The hardware, firmware, and software components of a computer system that implement the security policy of a system |
|
|
Term
|
Definition
| The operating system component of the TCB that protects the resources from applications |
|
|
Term
|
Definition
| A specification that includes the use of cryptoprocessors to create a secure computing environment |
|
|
Term
| unified extensible firmware interface |
|
Definition
| A firmware interface that initializes hardware for an operating system boot. |
|
|
Term
| unified threat management |
|
Definition
| The practice of centralizing various security techniques into a single appliance |
|
|
Term
|
Definition
| An external media solution where two devices connect over USB in a master/slave configuration |
|
|
Term
| virtual desktop environment |
|
Definition
| A VM that runs a desktop operating system |
|
|
Term
| virtual desktop infrastructure |
|
Definition
| A virtualization implementation that separates ilie personal computing environment from a user's physical computer |
|
|
Term
| virtual local area network |
|
Definition
| A logical method of segmenting a network at ilie Data Link layer layer 2 of the OSI model |
|
|
Term
| virtual machine lifecycle management |
|
Definition
| A collection of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of VMs over the course of their existence |
|
|
Term
|
Definition
| A virtualized computer that consists of an operating system and applications that run in a virtual environment that simulates dedicated physical hardware |
|
|
Term
| virtual mobile infrastructure |
|
Definition
| A mobile deployment model that allows employees' devices to connect to VMs that run mobile operating systems so that they can perform work tasks in a controlled environment |
|
|
Term
|
Definition
| A method of extending a private network by tunneling thmugh a public network, such as the Internet |
|
|
Term
|
Definition
| A term used for a technology that enables telephony communications over a network by using the IP protocol |
|
|
Term
|
Definition
| A firewall that is deployed to secure an organization's web applications and other application-based infrastructure from attackers |
|
|
Term
|
Definition
| An improvement to the WPA protocol that implements all mandatory components of the 802.1li standard, including Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption for increased security, and a 128- bit encryption key |
|
|
Term
|
Definition
| A wireless encryption protocol that generates a 128-bit key for each packet sent. Superseded by WPA2 |
|
|
Term
|
Definition
| An insecure feature of WPA and WPA2 that allows enrollment in a wireless network based on an 8-digit PIN |
|
|
Term
|
Definition
| A depreciated protocol that provides 64-bit, 128-bit, and 256- bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols |
|
|
Term
| wireless intrusion prevention system |
|
Definition
| An active, inline security device that monitors suspicious network and/or system traffic on a wireless network and reacts in real time to block it |
|
|
Term
| write once read many storage |
|
Definition
| A storage medium used in SIEM to maintain the integrity of the security data being compiled |
|
|
Term
|
Definition
| A symmetric encryption algorithm that encrypts data by processing each block of data 3 times |
|
|
Term
|
Definition
| wireless standard for home & business that adds QoS features & Multimedia support to 802.11a & 802.11b Throughput up to 600 Mbps in the 2.4 and 5 GHz range |
|
|
Term
|
Definition
| A family of wireless protocols developed by IEEE Wireless LAN Communications |
|
|
Term
|
Definition
| Wireless Communication protocol that improves upon 802.11 n by adding wider channels to increase throughput |
|
|
Term
|
Definition
| fast, secure but relatively expensive protocol for wireless communication.supports speeds up to 54 Mbps and 5 GHz |
|
|
Term
|
Definition
| first specification to be called wifi. the least expensive wireless. supports speeds up to 11 Mbps and 2.4 GHz |
|
|
Term
|
Definition
| Wireless Communication protocol that supports speeds up to 54 Mbps and 2.4 GHz that is potential replacement for 802.11b |
|
|
Term
|
Definition
| Standard for encapsulating EAP Communications over LAN or Wireless LAN that provides port-based authentication |
|
|
Term
|
Definition
| Authentication, Authorization & Accounting-security concept where a centralized platform verifies object ID, Assigned Permissions and Logs to create an audit trail |
|
|
Term
|
Definition
| After Action Report-Analysis of events that can provide insight into how to improve response processes in the future |
|
|
Term
|
Definition
| Attribute Based Access Control-Access control technique that evaluates a set of attributes that each subjects possesses-Determines if access should be granted |
|
|