Shared Flashcard Set

Details

Audit 2 - Exam 2
Chapter 7
31
Accounting
Graduate
03/15/2009

Additional Accounting Flashcards

 


 

Cards

Term
Access control list (ACL)
Definition
A file that contains the basic and extended permissions that define user access to information assets
Term
Active directory (AD)
Definition
Microsoft's direcotry database for Windows system
Term
Application programming interface (API)
Definition
A set of system-level routines that can be used in an application program for tasks such as basic input/output and file management
Term
Authentication
Definition
Process of validating the identity of the user or program that is requesting access to a computing resource
Term
Authorization
Definition
Process of determining types of activities that are permitted. Usually, authorization is in the context of authentication: once you have authenticated a user, the user may be authorized different types of access or activity
Term
Baseline
Definition
A starting point or a snapshot of existing condition(s) against which future changes to a computing resource can be measured
Term
Biometrics
Definition
One promising authentication technology is biometrics. The basic premise is that the user is authenticated based on some unique physical characteristic.
Term
Brute-force attacks
Definition
Technique of trying to guess a password by running through a list of all possiblities. The attack is often used after dictionary attack fails to guess passwords.
Term
Common interest file system (CIFS)
Definition
An enhanced version of Microsoft's open, cross-platform server message block (SMB) protocol. Used for sharing files across multiple operating systems including Windows, UNIX, and VMS.
Term
Dictionary attacks
Definition
Technique of trying to guess a password by running through a list of likely possibilities, often a list of words from a dictionary. The attack works because users often choose easy-to-guess passwords.
Term
File system
Definition
A method for storing, organizing, addressing, and retrieving computer files and the data they contain. File systems typically use a storage device such as a hard disk or CD-ROM.
Term
Jobs
Definition
Scheduled programs
Term
Malware
Definition
Short for "malicious software." A catchall term for any software that causes intentional damage to computer systems.
Term
NetWare directory service (NDS)
Definition
An X.500 compatible directory service software product released in 1993 by Novell for centrally managing access to resources on multiple servers and computers within a given network. Now rebranded as Novell eDirectory.
Term
Network file system (NFS)
Definition
A file-sharing protocol, originally developed by Sun Microsystems in 1984, that allows a computer to access files over a network as easily as if they were on its local disks.
Term
One-time password (OTP)
Definition
A one-time password is one password in a set of passwords, constructed such that it is extremely difficult to calculate the next password in the set given the previous passwords. Usually generated by a keyfob-type hardware device.
Term
One-way hash algorithms
Definition
An algorithm that generates an output of characters and numbers, called hash, by applying a mathematical formula to a document or sequence of text. A fundamental property of these functions is that (1) the output hash cannot be used to revert back to input text (hence one-way), and (2) no two inputs have the same output hash (hence collision free).
Term
Operating system (OS)
Definition
The sytem software that controls and manages hardware and basic system operations of a computer. Additionally, it provides a foundation on which application software such as word processing programs and Web browswers run.
Term
Passwd file
Definition
A file, readable by all local users, that contains definitions of all users of a UNIX system. The file is typically store in /etc folder and may contain password hashes (if the shadow file is not used)
Term
Password hash
Definition
An output of characters and numbers generated by applying a mathematical formula to a password. The hash is significantly shorter than the original text and is unique to the original text.
Term
Permissions
Definition
Attributes that may be associated with a computing resource that determine the types and level of access that different users have to it.
Term
Piggybacking
Definition
Refers to (1) an attack technique wherein the attacker gets a malicious program executred, in lieu of the intended program, by modifying the sceduled job; or (2) a method of gaining unauthorized access to computer facilities by following an authorized employee through a controlled door
Term
Root
Definition
Administrative or superuser account within UNIX-based operating systems
Term
Salt
Definition
One of the inputs, usually random, into the algorithm that generates hashes. The other input typically is the password or the passphrase.
Term
Samba
Definition
An open-source implementation of the SMB file-sharing protocol that provides file and print services to SMB/CIFS clients. It allows a non-Windows server to communicate with the same networking protocol as the Windows products. The name Samba is a variant of SMB, the protocol from which it stems.
Term
Secure shell (SSH)
Definition
Protocol that permits secure remote sccess over a network from one computer to another. SSH negotiates and establishes an encrypted connection between an SSH client and an SSH server, usually over port 22.
Term
Server message block (SMB)
Definition
A file-sharing protocol mainly applied to share files, printers, and serial ports between nodes on a network. It is mainly used by computers running Microsoft Windows operating systems.
Term
Shadow file
Definition
A file, readable only by administrators, htat contains the password hashes on UNIX systems. The file is typically sored in /etc folder.
Term
Smart card
Definition
Card that contains a computer chip embedded in plastic. A typical credit card's magnetic stripe can hold only a few dozen characters; however, smart cards can store significantly more information. When read by a special reader, smart cards can perform a number of functions or access data stored in the chip. These cards are used as cah cards, credit cards with a preset limit, or as ID cards with stored-in passwords. Also known as chip cards.
Term
Tripwire
Definition
A security tool that scans file systems and computes message digests (or hashes) for the files therin, which they can be used later to check for any changes to the files.
Term
Trust relationship
Definition
A relationship between two computer resources (operating systems, databases, networks) in which users who are members of one resource can access services on another trusting resource without the need for them to authenticate to the trusting resource
Supporting users have an ad free experience!