Term
|
Definition
Lists containing information that defines the access privileges for all valid users of the resource. An access control list assigned to each resource controls access to system resources such as directories, files, programs, and printers. |
|
|
Term
|
Definition
Controls that ensure that only authorized personnel have access to the firm's assets. |
|
|
Term
|
Definition
These contain key information about the user, including user ID, password, user group, and privileges granted to the user. |
|
|
Term
Advanced Encryption Standard (AES) |
|
Definition
Also known as Rijndael, a private key (or symmetric key) encryption technique. |
|
|
Term
Application-Level Firewalls |
|
Definition
Provides high-level network security. |
|
|
Term
|
Definition
Ensure that in the event of data loss due to unauthorized access, equipment failure, or physical disaster, the organization can recover its files and databases. |
|
|
Term
|
Definition
Devices that measure various personal characteristics, such as finger, voice, or retina prints, or other signature characteristics. |
|
|
Term
|
Definition
Hardware component that asks the caller to enter a password and then breaks the connection to perform a security check. |
|
|
Term
Certification Authority (CA) |
|
Definition
Trusted third parties that issue digital certificates. |
|
|
Term
|
Definition
Feature that suspends all data processing while the system reconciles the transaction log and the database change log against the database. |
|
|
Term
|
Definition
Language translation modules of the operation system. |
|
|
Term
|
Definition
Use of an algorithm to scramble selected data, making it unreadable to an intruder browsing the database. |
|
|
Term
Database Authorization Table |
|
Definition
Table containing rules that limit the actions a user can take. |
|
|
Term
Deep Packet Inspection (DPI) |
|
Definition
Program used to determine when a DOS attack is in progress through a variety of analytical and statistical techniques that evaluate the contents of message packets. |
|
|
Term
|
Definition
Mathematical value calculated from the text content of the message. |
|
|
Term
|
Definition
Sender's public key that has been digitally signed by trusted third parties. |
|
|
Term
|
Definition
Encryption method in which both DES and RSA are used together. |
|
|
Term
|
Definition
Electronic authentication technique that ensures the transmitted message originated with the authorized sender and that it was not tampered with after the signature was applied. |
|
|
Term
Discretionary Access Privileges |
|
Definition
Grants access privileges to other users. For example, the controller, who is the owner of the general ledger, may grant read-only privileges to a manager in the budgeting department. |
|
|
Term
|
Definition
Technique that involves the receiver of the message returning the message to the sender. |
|
|
Term
|
Definition
Encryption that uses one key to encrypt the message. |
|
|
Term
|
Definition
Encryption that uses three different keys to encrypt the message three times. |
|
|
Term
|
Definition
Use of a computer program to transform a standard message being transmitted into a coded (cipher text) form. |
|
|
Term
|
Definition
Summarizes key activities related to system resources. |
|
|
Term
|
Definition
Software and hardware that provide a focal point for security by channeling all network connections through a control gateway. |
|
|
Term
|
Definition
Language translation modules of the operation system that convert one line of logic at a time. |
|
|
Term
Intrusion Prevention Systems (IPS) |
|
Definition
Use of deep packet inspection (DPI) to determine when an attack is in progress. |
|
|
Term
|
Definition
Recording both the user's keystrokes and the system's responses. |
|
|
Term
|
Definition
Errors caused when the bit structure of the message is corrupted through noise on the communications lines. |
|
|
Term
|
Definition
Operating system's first line of defense against unauthorized access. |
|
|
Term
Message Sequence Numbering |
|
Definition
Sequence number inserted in each message to foil any attempt by an intruder in the communications channel to delete a message from a stream of messages, change the order of messages received, or duplicate a message. |
|
|
Term
|
Definition
Log in which all incoming and outgoing messages, as well as attempted (failed) access, should be recorded. |
|
|
Term
|
Definition
System that provides basic screening of low-security messages (for example, e-mail) and routes them to their destinations based on the source and destination addresses attached. |
|
|
Term
|
Definition
Network passwords that constantly change. |
|
|
Term
|
Definition
A computer's control program. |
|
|
Term
Operating System Security |
|
Definition
Controls the system in an ever-expanding user community sharing more and more computer resources. |
|
|
Term
|
Definition
Technique that incorporates an extra bit into the structure of a bit string when it is created or transmitted. |
|
|
Term
|
Definition
Code, usually kept secret, entered by the user to gain access to data files. |
|
|
Term
|
Definition
One method of encryption. |
|
|
Term
|
Definition
Technique that uses two encryption keys: one for encoding the message, the other for decoding it. |
|
|
Term
|
Definition
Uses the logs and backup files to restart the system after a failure. |
|
|
Term
Request-Response Technique |
|
Definition
Technique in which a control message from the sender and a response from the sender are sent at periodic synchronized intervals. |
|
|
Term
|
Definition
Network password that can be used more than one time. |
|
|
Term
RSA (Rivest-Shamir-Adleman) |
|
Definition
One of the most trusted public key encryption methods. This method, however, is computationally intensive and much slower than private key encryption. |
|
|
Term
|
Definition
Firewall that examines the source and destination addresses attached to incoming message packets. |
|
|
Term
|
Definition
Logs that record activity at the system, application, and user level. |
|
|
Term
|
Definition
Listing of transactions that provides an audit trail of all processed events. |
|
|
Term
|
Definition
Enhancement to an older encryption technique for transmitting transactions. |
|
|
Term
|
Definition
Set of data that a particular user needs to achieve his or her assigned tasks. |
|
|
Term
|
Definition
Procedure that allows the user to create a personal security program. It provides more positive user identification than a password. |
|
|