Shared Flashcard Set

Details

CASP+ Vocabulary
CASP+ 004 Terms and Vocabs
59
Computer Science
Advanced
04/05/2023

Additional Computer Science Flashcards

 


 

Cards

Term
a property of key-agreement protocols ensuring that a session key derived from a set of long-term keys cannot be compromised if one of the long-term keys is compromised in the future.
Definition
PFS [Perfect Forward Secrecy]
Term
The randomness collected by an operating system or application for use in cryptography or other uses that require random data. This randomness is often collected from hardware sources, either pre-existing ones such as mouse movements or specially provided randomness generators
Definition
Entropy
Term
The process of breaking out of a virtual machine and interacting with the host operating system.
Definition
VMEscape
Term
family of related protocols handling remote authentication and related services for networked access control through a centralized server
Definition
TACACS [Terminal Access Controller Access-Control System]
Term
Although derived from TACACS, TACACS+ is a separate protocol that handles authentication, authorization, and accounting (AAA) services. TACACS+ and other flexible AAA protocols have largely replaced their predecessors.
Definition
TACACS+ [Terminal Access Controller Access-Control System Plus]
Term
A role donned by a system entity where the system entity provides services to principals or other system entities
Definition
SP [Service Provider]
Term
Is responsible for issuing identification information for all providers looking to interact/service with the system in any possible way, this is achieved via an authentication module which verifies a security token as an alternative to explicitly authenticating a user within a security realm.
Definition
IdP [Identity Provider] : aka Identity Assertion Provider
Term
a computer networking protocol defined in RFC 2845. It is used primarily by the Domain Name System (DNS) to provide a means of authenticating updates to a Dynamic DNS database, although it can also be used between servers and for regular queries.
Definition
TSIG [Transaction SIGnature]
Term
n Unix operating systems is an operation that changes the apparent root directory for the current running process and its children. A program that is run in such a modified environment cannot name (and therefore normally not access) files outside the designated directory tree. The modified environment is called a "chroot jail".
Definition
Chroot
Term
type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.
Definition
MAC [Mandatory Access Control]
Term
which also governs the ability of subjects to access objects, allows users the ability to make policy decisions and/or assign security attributes.
Definition
DAC [Discretionary Access Control]
Term
an XML-based open standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider.
Definition
SAML [Security Assertion Markup Language]
Term
is a version of the SAML standard for exchanging authentication and authorization data between security domains. SAML 2.0 is an XML-based protocol that uses security tokens containing assertions to pass information about a principal (usually an end user) between a SAML authority, that is, an identity provider, and a SAML consumer, that is, a service provider. SAML 2.0 enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO), which helps reduce the administrative overhead of distributing multiple authentication tokens to the user.
Definition
SAMLv2 [Security Assertion Markup Language 2.0]
Term
a type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into Web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy.
Definition
XSS [Cross-site scripting]
Term
is the networking standard that supports virtual LANs (VLANs) on an Ethernet network. The standard defines a system of tagging for Ethernet frames and the accompanying procedures to be used by bridges and switches in handling such frames. The standard also contains provisions for a quality of service prioritization scheme commonly known as IEEE 802.1p and defines the Generic Attribute Registration Protocol.
Definition
802.11q - IEEE 802.1Q
Term
is an approved amendment to the IEEE 802.11 standard that defines a set of Quality of Service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer.[1] The standard is considered of critical importance for delay-sensitive applications, such as Voice over Wireless LAN and streaming multimedia. The amendment has been incorporated into the published IEEE 802.11-2007 standard.
Definition
802.11e - EEE 802.11e-2005 or 802.11e
Term
The systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.[1] The systems development life-cycle concept applies to a range of hardware and software configurations, as a system can be composed of hardware only, software only, or a combination of both.
Definition
SDLC
Term
Fuzz testing or fuzzing is a software testing technique, often automated or semiautomated, that involves providing invalid, unexpected, or random data to the inputs of a computer program. The program is then monitored for exceptions such as crashes, or failing built-in code assertions or for finding potential memory leaks.
Definition
Fuzzer
Term
describes a bilateral or multilateral agreement between two or more parties. It expresses a convergence of will between the parties, indicating an intended common line of action . It is often used in cases where parties either do not imply a legal commitment or in situations where the parties cannot create a legally enforceable agreement. It is a more formal alternative to a gentlemen's agreement.
Definition
MOU memorandum of understanding (MoU)
Term
defines the interdependent relationships among the internal support groups of an organization working to support a service-level agreement (SLA).[1] The agreement describes the responsibilities of each internal support group toward other support groups, including the process and timeframe for delivery of their services. The objective of the OLA is to present a clear, concise and measurable description of the service provider's internal support relationship
Definition
OLA Operational-level agreement (OLA)
Term
are bulk unsolicited, automatically dialled, pre-recorded phone calls using the Voice over Internet Protocol (VoIP).[1] Telephone spam is comparable to E-mail spam, but due to its synchronous character, different mitigation methods are needed.
Definition
SPIT (Spam over Internet Telephony)
Term
defines a profile of RTP (Real-time Transport Protocol), intended to provide encryption, message authentication and integrity, and replay protection to the RTP data in both unicast and multicast applications. It was developed by a small team of IP protocol and cryptographic experts from Cisco and Ericsson including David Oran, David McGrew, Mark Baugher, Mats Naslund, Elisabetta Carrara, Karl Norman, and Rolf Blom. It was first published by the IETF in March 2004 as RFC 3711.
Definition
Secure Real-time Transport Protocol (or SRTP)
Term
The standard defines a declarative access control policy language implemented in XML and a processing model describing how to evaluate access requests according to the rules defined in policies.
Definition
XACML stands for eXtensible Access Control Markup Language
Term
is a system operating with coded signals over communication channels so as to provide control of remote equipment (using typically one communication channel per remote station). The supervisory system may be combined with a data acquisition system by adding the use of coded signals over communication channels to acquire information about the status of the remote equipment for display or for recording functions.
Definition
SCADA (supervisory control and data acquisition)
Term
A web application firewall (WAF) protects web application servers and infrastructure from attacks and breaches originating from the Internet and external networks. It is a purpose-built firewall that can be customized to accept and reject HTTP requests and sessions using predefined rules.
Definition
WAF Web application Firewall
Term
A security requirements traceability matrix (SRTM) is a grid that allows documentation and easy viewing of what is required for a system's security. SRTMs are necessary in technical projects that call for security to be included. Traceability matrixes in general can be used for any type of project, and allow requirements and tests to be easily traced back to one another. The matrix is a way to make sure that there is accountability for all processes and is an effective way for a user to ensure that all work is being completed.
Definition
SRTM review - Security Requirements Tractability Matrix Review
Term
is a software testing technique that focuses on the analysis of software
functionality, versus internal system mechanisms. Black box testing was developed as a method of analyzing client requirements, specifications and high-level design strategies. A black box software tester selects a set of valid and invalid input and code execution conditions and checks for valid output responses. Black box testing is also known as functional testing.
Definition
Black box Testing
Term
is a methodology used to ensure and validate the internal framework, mechanisms, objects and components of a software application. White-box testing verifies code according to design specifications and uncovers application vulnerabilities. White-box testing is also known as transparent box testing, clear box testing, structural testing and glass box testing. Glass box and clear box indicate that internal mechanisms are visible to a software engineering team.
Definition
White-box testing
Term
is a software testing methodology that involves the combination of white box and black box testing. It makes use of the straightforward technique of black box testing, as well as the approach for code targeted systems, as in the case of white box testing. Testers that use gray box testing need high-level application documentation to complete the tests. Gray box testing is geared toward finding defects based on improper structure or application use. Gray box testing is also known as translucent testing.
Definition
Gray box testing
Term
is a term for software and products services combining security information management (SIM) and security event management (SEM). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. SIEM is sold as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes.
Definition
Security information and event management (SIEM)
Term
references a set of principles and methodologies applied by software engineers to design and develop software in the form of interoperable services. Services are usually built in the form of components that can be reused for different purposes than originally intended. For this reason, the interfaces are often defined in a practical manner, allowing use across varying applications and multiple platforms
Definition
Service-oriented architecture (SOA)
Term
is a computer network technology that encapsulates Fibre Channel frames over Ethernet networks. This allows Fibre Channel to use 10 Gigabit Ethernet networks (or higher speeds) while preserving the Fibre Channel protocol. The specification was part of the International Committee for Information Technology Standards T11 FC-BB-5 standard published in 2009.[1]
Definition
Fibre Channel over Ethernet (FCoE)
Term
is a distribution frame [passive device which terminates cables, allowing arbitrary interconnections to be made] in a central office or customer premises, which cross-connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF) or combined distribution frame (CDF) to individual cables connected to equipment in areas remote from these frames. IDFs are used for telephone exchange central office, customerpremise equipment, wide area network (WAN), and local area network (LAN) environments, among others.
Definition
intermediate distribution frame (IDF)
Term
occurs in computer networks when there is more than one Layer 2 (OSI model) path between two endpoints (e.g. multiple connections between two network switches or two ports on the same switch connected to each other). The loop creates broadcast storms as broadcasts and multicasts are forwarded by switches out every port, the switch or switches will repeatedly rebroadcast the broadcast messages flooding the network. Since the Layer 2 header does not support a time to live (TTL) value, if a frame is sent into a looped topology, it can loop forever. A physical topology that contains switching or bridge loops is attractive for redundancy reasons, yet a switched network must not have loops. The solution is to allow physical loops, but create a loop-free logical topology using the spanning tree protocol (STP) on the network switches.
Definition
Bridge Loop
Term
is a basic measure of the maintainability of repairable items. It represents the average time required to repair a failed component or device.[1] Expressed mathematically, it is the total corrective maintenance time divided by the total number of corrective maintenance actions during a given period of time.[2] It generally does not include lead time for parts not readily available or other Administrative or Logistic Downtime (ALDT)
Definition
Mean Time To Repair (MTTR)
Term
is an XML-based framework, being developed by OASIS, for exchanging user, resource and service provisioning information between cooperating organizations. The Service Provisioning Markup language is the open standard for the integration and interoperation of service provisioning requests. SPML is an OASIS standard based on the concepts of Directory Service Markup Language. SPML version 1.0 was approved in October 2003. SPML version 2.0 was approved in April 2006. Security Assertion Markup Language exchanges the authorization data.
Definition
Service Provisioning Markup Language (SPML)
Term
The standard defines a declarative access control policy language implemented in XML and a processing model describing how to evaluate access requests according to the rules defined in policies. As a published standard specification, one of the goals of XACML is to promote common terminology and interoperability between access control implementations by multiple vendors. XACML is primarily an Attribute Based Access Control system (ABAC), where attributes (bits of data) associated with a user or action or resource are inputs into the decision of whether a given user may access a given resource in a particular way. Role-based access control (RBAC) can also be implemented in XACML as a specialization of ABAC.
Definition
The standard defines a
declarative access control policy language implemented in XML and a processing model
describing how to evaluate access requests according to the rules defined in policies. As a
published standard specification, one of the goals of XACML is to promote common terminology
and interoperability between access control implementations by multiple vendors. XACML is
primarily an Attribute Based Access Control system (ABAC), where attributes (bits of data)
associated with a user or action or resource are inputs into the decision of whether a given user
may access a given resource in a particular way. Role-based access control (RBAC) can also be
implemented in XACML as a specialization of ABAC.
Term
is a financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or system. It is a management accounting concept that can be used in full cost accounting or even ecological economics where it includes social costs.
Definition
Term
is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point). Each type of communication protocol has a different tool to collect and analyze signals and data.

Protocol analyzer may refer to:
A Telecom Network Protocol Analyzer
A network packet analyzer
A bus analyzer
An IP Load tester
Definition
Protocol analyzer"

Protocol analyzer may refer to:
A Telecom Network Protocol Analyzer
A network packet analyzer
A bus analyzer
An IP Load tester
Term
is a software architecture model used for designing and implementing communication between mutually interacting software applications in a serviceoriented architecture (SOA). As a software architectural model for distributed computing it is a specialty variant of the more general client server model and promotes agility and flexibility with regards to communication between applications. Its primary use is in enterprise application integration (EAI) of heterogeneous and complex landscapes
Definition
Enterprise Service Bus (ESB)
Term
are considered extensions of intrusion detection systems because they both monitor network traffic and/or system activities for malicious activity. The main differences are, unlike intrusion detection systems, intrusion prevention systems are placed inline and are able to actively prevent/block intrusions that are detected.[2][3] More specifically, IPS can take such actions as sending an alarm, dropping the malicious packets, resetting the connection and/or blocking the traffic from the offending IP address.[4] An IPS can also correct Cyclic Redundancy Check (CRC) errors, unfragment packet streams, prevent TCP sequencing issues, and clean up unwanted transport and network layer options.
Definition
Intrusion prevention systems
Term
Intrusion prevention systems can be classified into four different types:[1][6]
Definition
Network-based intrusion prevention system (NIPS)
Wireless intrusion prevention systems (WIPS)
Network behavior analysis (NBA
Host-based intrusion prevention system (HIPS)
Term
monitors the entire network for suspicious traffic by analyzing protocol activity.
Definition
Network-based intrusion prevention system (NIPS)
Term
monitor a wireless network for suspicious traffic by analyzing wireless networking protocols.
Definition
Wireless intrusion prevention systems (WIPS)
Term
examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware and policy violations.
Definition
Network behavior analysis (NBA)
Term
an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host
Definition
Host-based intrusion prevention system (HIPS)
Term
The majority of intrusion prevention systems utilize one of three detection methods
Definition
signature-based, statistical anomaly-based, and stateful protocol analysis
Term
Signature based IDS monitors packets in the Network and compares with pre-configured and pre-determined attack patterns known as signatures.
Definition
Signature-Based Detection
Term
A statistical anomaly-based IDS determines the normal network activity like what sort of bandwidth is generally used, what protocols are used, what ports and devices generally connect to each other- and alert the administrator or user when traffic is detected which is anomalous (not normal).
Definition
Statistical anomaly-based detection
Term
This method identifies deviations of protocol states by comparing observed events with “predetermined profiles of generally accepted definitions of benign activity.
Definition
Stateful Protocol Analysis Detection
Term
is information collected about a remote computing device for the purpose of identification. Fingerprints can be used to fully or partially identify individual users or devices even when cookies are turned off. Basic web browser configuration information has long been collected by web analytics services in an effort to accurately measure real human web traffic and discount various forms of click fraud. With the assistance of client-side scripting languages, collection of much more esoteric parameters is possible.[1][2] Assimilation of such information into a single string comprises a device fingerprint. In 2010, EFF measured at least 18.1 bits of entropy possible from browser fingerprinting,[3] but that was before the advancements of canvas fingerprinting, which claims to add another 5.7 bits. Recently such fingerprints have proven useful in the detection and prevention of online identity theft and credit card fraud
Definition
Device fingerprint or machine fingerprint or browser fingerprint
Term
is the behavior of an electronic or software system where the output is dependent on the sequence or timing of other uncontrollable events. It becomes a bug when events do not happen in the order the programmer intended. The term originates with the idea of two signals racing each other to influence the output first. Race conditions can occur in electronics systems, especially logic circuits, and in computer software, especially multithreaded or distributed programs.
Definition
RACE Condition or RACE hazard
Term
refers to a state of affairs where the purported maker of a statement will not be able to successfully challenge the validity of the statement or contract. The term is often seen in a legal setting wherein the authenticity of a signature is being challenged. In such an instance, the authenticity is being "repudiated".
Definition
Non-repudiation
Term
is the umbrella term covering an organization's approach across these three areas: Governance, risk management, and compliance.
Definition
Governance, Risk management, and Compliance or GRC
Term
describes the overall management approach through which senior executives direct and control the entire organization, using a combination of management information and hierarchical management control structures. This activities ensure that critical management information reaching the executive team is sufficiently complete, accurate and timely to enable appropriate management decision making, and provide the control mechanisms to ensure that strategies, directions and instructions from management are carried out systematically and effectively.[4]
Definition
Governance
Term
is the set of processes through which management identifies, analyzes, and, where necessary, responds appropriately to risks that might adversely affect realization of the organization's business objectives. The response to risks typically depends on their perceived gravity, and involves controlling, avoiding, accepting or transferring them to athird party. Whereas organizations routinely manage a wide range of risks (e.g. technological risks, commercial/financial risks, information security risks etc.), external legal and regulatory compliance risks are arguably the key issue in GRC.
Definition
Risk management
Term
means conforming with stated requirements. At an organizational level, it is achieved through management processes which identify the applicable requirements (defined for example in laws, regulations, contracts, strategies and policies), assess the state of compliance, assess the risks and potential costs of non-compliance against the projected expenses to achieve compliance, and hence prioritize, fund and initiate any corrective actions deemed necessary.
Definition
Compliance
Term
is a dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle.
Definition
HSM - A hardware security module (HSM)
Term
is an all-inclusive security product able to perform multiple security functions within one single appliance: network firewalling, network intrusion prevention and gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing, data leak prevention and on-appliance reporting
Definition
UTM - Unified Threat Management
Supporting users have an ad free experience!