Term
|
Definition
| infrastructures such as water, electricity, oil and gas refineries, and distribution, banking and finance, and telecommunications; loss would have severe repercussions on the nation |
|
|
Term
|
Definition
| highly technical individuals; have the ability to write scripts that exploit vulnerabilities and also capable of discovering new vulnerabilities |
|
|
Term
|
Definition
| act of deliberately accessing computer systems and networks without authorization |
|
|
Term
|
Definition
| a hacker who uses his / her skill for political purposes |
|
|
Term
| highly structured threat: |
|
Definition
| threat that is backed by the time and resources to allow virtually any form of attack |
|
|
Term
|
Definition
| use of information security techniques, both offensive and defensive, when combating an opponent |
|
|
Term
|
Definition
| the use of a series of ICMP ping messages to map out a network |
|
|
Term
|
Definition
| examination of TCP and UDP ports to determine which are open and what services are running |
|
|
Term
|
Definition
| hackers with little true technical skill and hence only use scripts that someone else has developed |
|
|
Term
|
Definition
| threat that has reasonable financial backing and can last for a few days or more; organizational elements allow for greater time to penetrate and attack a system |
|
|
Term
|
Definition
| generally conducted over short periods, do not involve large numbers of individuals, have little financial backing; usually accomplished by insiders or outsiders not seeking collusion with others |
|
|
Term
|
Definition
| the ability to control whether a subject (individual or process running on a computer system) can interact with an object (file or hardware device); term used to describe a variety of protection schemes; sometimes refers to all security features used to prevent unauthorized access; controls what operations a user can perform |
|
|
Term
|
Definition
| process by which a subject’s identity is verified; ensure that an individual is who they claim to be |
|
|
Term
|
Definition
| part of the “CIA” of security; applies to the resources being present and accessible when the subject (user) wants to access or use them |
|
|
Term
| Bell-LaPadula security model: |
|
Definition
| security model built around the property of confidentiality; characterized by no-read-up and no-write-down rules |
|
|
Term
|
Definition
| security model built around property of integrity; characterized by no-write-up and no-read-down rules |
|
|
Term
|
Definition
| part of the “CIA” of security; information should not be disclosed to unauthorized |
|
|
Term
|
Definition
| all actions are prohibited unless specifically authorized |
|
|
Term
|
Definition
| part of the “CIA” of security; information is not modified except by authorized individuals |
|
|
Term
|
Definition
| ability to verify that an operation has been performed by a particular person or account; system property that prevents parties to a transaction from subsequently denying involvement in the transaction; deals with ability to verify that a message has been sent and received, and sender can be identified and verified; tied to asymmetric cryptography |
|
|
Term
| security through obscurity: |
|
Definition
| uses the approach of protecting something by hiding it |
|
|
Term
|
Definition
| ensures that for any given task, more than one individual needs to be involved |
|
|
Term
|
Definition
| process of convincing an authorized individual to provide confidential information or access to an unauthorized individual |
|
|
Term
| Quantitative risk assessment |
|
Definition
| Only deals with strict $$ amount. |
|
|
Term
| Qualitative risk assessment |
|
Definition
| takes into account of tangible and intangible value |
|
|
Term
| Risk Assessment and Mitigation |
|
Definition
| Deals with identifying, assessing and reducing the risk of security breaches against company assests. |
|
|
Term
|
Definition
| Annual Loss Expectancy (ALE = ARO * SLE) |
|
|
Term
|
Definition
| Annual Rate of Occurance (risk of occurance) |
|
|
Term
|
Definition
| Single Loss of expectancy (loss of revenue based on down time) |
|
|
Term
|
Definition
| Identifying hardware and data, evaluating their worth. |
|
|
Term
|
Definition
| options based on the probability of the risk vs. the cost of the solution (avoidence, transference, acceptance, mitigation, and deterrence) |
|
|
Term
|
Definition
| Risk doesn't merit the cost of implementing a solution |
|
|
Term
|
Definition
| Company transfers the risk to a third party (such as an insurance company or offsite storage area) |
|
|
Term
|
Definition
| Acceptable level of risk for the profits that can be achieved. |
|
|
Term
|
Definition
| implementing countermeasures for the risk. |
|
|
Term
|
Definition
| extension of mitigation where more controls are used to deter threats. |
|
|
Term
|
Definition
| Security issue that has passed security controls as a legitimate action when it should not have. |
|
|
Term
|
Definition
| Legitimate action that is perceived as a risk/threat. |
|
|
Term
|
Definition
| Security policies, Network access policies, HR policies. |
|
|
Term
|
Definition
| Health Insurance Portability and Accountability |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|