Shared Flashcard Set

Details

CIS 110 Final
final
52
Computer Science
Undergraduate 1
06/09/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Acceptable Use Policy (AUP)
Definition
A policy that defines the actions users may perform while accessing systems and networking equipment
Term
Asymmetric Encryption
Definition
Cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely
Term
Asymmetric Key
Definition
A public key is used to encrypt a message but only the person that has the private key may be able to decrypt the message
Term
Authenticity
Definition
Being the person you claim to be
Term
Availability
Definition
Security actions that ensure that data is accessible to authorized users
Term
Bridge Trust Model
Definition
A trust model with one CA that acts as a facilitator to interconnect all other CAs
Term
Certificate authority (CA)
Definition
A trusted third-party agency that is responsible for issuing digital certificates
Term
Chain of Custody
Definition
A process of documentation that shows that evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence
Term
Cleartext
Definition
Unencrypted data
Term
Cold Site
Definition
A remote site that provides office space; the customer must provide and install all the equipment needed to continue operations
Term
Computer Forensics
Definition
Using technology to search computer evidence of crime
Term
Confidentiality
Definition
Security actions that ensure only authorized parties can view information
Term
Cryptography
Definition
The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it
Term
Decryption
Definition
The process of changing ciphertext into plaintext
Term
Digital Certificate
Definition
A technology used to associate a user's identity to a public key, in which the user's public key is "digitally signed" by a trusted third party
Term
Digital Signature
Definition
A mathematical scheme for demonstrating the authenticity of a digital message or document
Term
Disaster Recovery
Definition
The procedures and processes for recovering an organization's IT operations fallowing a disaster
Term
Distributed Trust Model
Definition
A trust model that has multiple CAs that sign a digital certificate
Term
Encrypted File System (EFS)
Definition
A Windows feature that allows files to be transparently encrypted to protect confidential data from attackers with physical access to the computer
Term
Encryption
Definition
The process of changing plaintext into ciphertext
Term
Faraday Cage
Definition
A metallic enclosure that prevents the entry or escape of an electromagnetic field
Term
Hashing
Definition
The process for creating a unique digital fingerprint signature for a set of data
Term
Hierarchical Trust Model
Definition
A trust model that has a single hierarchy with one master CA
Term
Hot Site
Definition
A duplicate of the production site that has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link
Term
Integrity
Definition
Security actions that ensure that the information is correct and no unauthorized person or malicious person or software have altered the data
Term
IP Security (IPsec)
Definition
A set of protocols developed to support the secure exchange of packets
Term
Key Recover Agent (KRA)
Definition
A highly trusted person responsible for recovering lost or damaged digital certificates
Term
Nonrepudiation
Definition
The process of proving a user performed an action
Term
Penetration Testing
Definition
A test by an outsider to actually to exploit any weaknesses in systems that are vulnerable
Term
Prime Number
Definition
A number greater than 1 that has no positive divisors other than 1 and itself
Term
Privacy Policy
Definition
a policy that outlines how the organization uses personal information it collects
Term
Private Key
Definition
An asymmetric encryption key that does have to be protected
Term
Public Key
Definition
An asymmetric encryption key that does not have to be protected
Term
Public Key Infrastructure (PKI)
Definition
A framework for all the entries involved in digital certificates for digital certificate management
Term
Registration Authority (RA)
Definition
A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users
Term
Risk
Definition
The likelihood that a threat agent will exploit the vulnerability
Term
Risk Management
Definition
The assessment of exploits from vulnerabilities
Term
Security Policy
Definition
A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure
Term
Social Engineering
Definition
A means of gathering information for an attack relying on the weakness of individuals
Term
Social Networking
Definition
Grouping individuals and organizations into clusters or groups based on a like affiliation
Term
Secure Shell (SSH)
Definition
A UNIX-based command interface and protocol for securely accessing a computer
Term
Stenography
Definition
Hiding the existence of data within a text, audio, image, or video file
Term
Succession Planning
Definition
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
Term
Symmetric Encryption
Definition
Encryption that uses a single key to encrypt and decrypt a message
Term
Symmetric Key
Definition
They key used to both encrypt and decrypt a message
Term
Third-party Trust Model
Definition
A trust model in which two individuals trust each other because each individually trusts a third-party
Term
Threat
Definition
A type of action that has the potential to cause harm
Term
Trusted Platform Module (TPM)
Definition
A chip on a motherboard of the computer that provides cryptographic services
Term
Uninterruptible Power Supply
Definition
An electrical apparatus that provides emergency power to a load when the input power source fails
Term
Van Eck Phreaking
Definition
The process of eavesdropping on the contents of a CRT or LCD display by detecting its electromagnetic emissions
Term
Vulnerability
Definition
A flaw or weakness that allows a threat agent to bypass security
Term
Warm Site
Definition
A remote site that contains computer equipment but does not have active Internet or telecommunication facilities, and does not have backups of data
Supporting users have an ad free experience!