Shared Flashcard Set

Details

CISM ROUND 2
CYBER
334
Computer Networking
Not Applicable
09/18/2024

Additional Computer Networking Flashcards

 


 

Cards

Term
Access controls
Definition
The processes, rules and deployment mechanisms that control access to information systems, resources and
physical access to premises
Term
Access path
Definition
The logical route that an end user takes to access computerized information. Typically it includes a route through the operating system, telecommunications software, selected application software and the access
control system.
Term
Access rights
Definition
The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by
data owners and the information security policy
Term
Accountability
Definition
The ability to map a given activity or event back to the
responsible party
Term
Address Resolution Protocol (ARP)
Definition
Defines the exchanges between network interfaces
connected to an Ethernet media segment in order to map an IP address to a link layer address on demand
Term
Administrative control
Definition
The rules, procedures and practices dealing with operational effectiveness, efficiency and adherence to regulations and management policies
Term
Advance encryption
standard (AES)
Definition
The international encryption standard that replaced 3DES
Term
Alert situation
Definition
The point in an emergency procedure when the elapsed time passes a threshold and the interruption is not resolved. The organization entering into an alert situation
initiates a series of escalation steps.
Term
Algorithm
Definition
A finite set of step-by-step instructions for a problem-
solving or computation procedure, especially one that can be implemented by a computer
Term
Alternate facilities
Definition
Locations and infrastructures from which emergency or backup processes are executed, when the main premises are unavailable or destroyed. This includes other
buildings, offices or data processing centers.
Term
Alternate process
Definition
Automatic or manual process designed and established to continue critical business processes from point-of-failure
to return-to-normal
Term
Annual loss expectancy
(ALE)
Definition
The total expected loss divided by the number of years in
the forecast period yielding the average annual loss
Term
Anomaly detection
Definition
Detection on the basis of whether the system activity
matches that defined as abnormal
Term
Anonymous File Transfer Protocol (AFTP)
Definition
A method of downloading public files using the File Transfer Protocol (FTP). AFTP does not require users to identify themselves before accessing files from a particular server. In general, users enter the word "anonymous" when the host prompts for a username.
Anything can be entered for the password, such as the user's e-mail address or simply the word "guest." In many cases, an AFTP site will not prompt a user for a name and
password.
Term
Antivirus software
Definition
An application software deployed at multiple points in an IT architecture. It is designed to detect and potentially eliminate virus code before damage is done, and repair or quarantine files that have already been infected
Term
Application controls
Definition
The policies, procedures and activities designed to
provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
Term
Application layer
Definition
In the Open Systems Interconnection (OSI) communications model, the application layer provides services for an application program to ensure that effective communication with another application program in a network is possible. The application layer is not the application that is doing the communication; it is a
service layer that provides these services.
Term
Application programming interface (API)
Definition
A set of routines, protocols and tools referred to as "building blocks" used in business application software development. A good API makes it easier to develop a program by providing all the building blocks related to functional characteristics of an operating system that applications need to specify, for example, when interfacing with the operating system (e.g., provided by Microsoft Windows, different versions of UNIX). A programmer utilizes these APIs in developing applications that can operate effectively and efficiently on the
platform chosen.
Term
Application service provider (ASP)
Definition
Also known as managed service provider (MSP), it deploys, hosts and manages access to a packaged application to multiple parties from a centrally managed facility. The applications are delivered over networks on a
subscription basis.
Term
Architecture
Definition
Description of the fundamental underlying design of the components of the business system, or of one element of the business system (e.g., technology), the relationships among them, and the manner in which they support the
organization's objectives
Term
Asymmetric key
Definition
A cipher technique in which different cryptographic keys are used to encrypt and decrypt a message
Term
Attack Sequence
Definition
A specific sequence of events indicative of an unauthorized access attempt. Typically a characteristic byte pattern used in malicious code or an indicator, or set of indicators, that allows the identification of malicious
network activities.
Term
Audit trail
Definition
A visible trail of evidence enabling one to trace information contained in statements or reports back to
the original input source
Term
Authentication
Definition
The act of verifying the identity (i.e., user, system)
Term
Authorization
Definition
Access privileges granted to a user, program, or process
or the act of granting those privileges
Term
Availability
Definition
Information that is accessible when required by the
business process now and in the future
Term
Backup center
Definition
An alternate facility to continue IT/IS operations when the
primary data processing (DP) center is unavailable
Term
Baseline security
Definition
The minimum security controls required for safeguarding
an IT system based on its identified needs for confidentiality, integrity, and/or availability protection
Term
Benchmarking
Definition
A systematic approach to comparing an organization's performance against peers and competitors in an effort to learn the best ways of conducting business. Examples include benchmarking of quality, logistic efficiency and
various other metrics.
Term
Bit
Definition
The smallest unit of information storage; a contraction of the term "binary digit;" one of two symbols "0" (zero) and
"1" (one) that are used to represent binary numbers
Term
Bit copy
Definition
Provides an exact image of the original and is a
requirement for legally justifiable forensics
Term
Bit-stream image
Definition
Bit-stream backups, also referred to as mirror image backups, involve the backup of all areas of a computer hard disk drive or other type of storage media. Such backups exactly replicate all sectors on a given storage device including all files and ambient data storage areas.
Term
Botnet
Definition
A large number of compromised computers that are used to create and send spam or viruses or flood a network
with messages such as a denial-of-service attack
Term
Brute force attack
Definition
Repeatedly trying all possible combinations of passwords
or encryption keys until the correct one is found
Term
Business case
Definition
Documentation of the rationale for making a business investment, used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the
investment through its full economic life cycle
Term
Business continuity plan (BCP)
Definition
A plan used by an organization to respond to disruption of critical business processes. Depends on the
contingency plan for restoration of critical systems
Term
Business dependency
assessment
Definition
A process of identifying resources critical to the operation
of a business process
Term
Business impact
Definition
The net effect, positive or negative, on the achievement of
business objectives
Term
Business impact analysis/assessment (BIA)
Definition
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an organization, establishes the escalation of that loss over time, identifies the minimum resources needed to recover, and prioritizes the recovery of processes and supporting system. This process also includes addressing: income loss, unexpected expense, legal issues (regulatory compliance or contractual), interdependent processes, and loss of
public reputation or public confidence.
Term
Business Model for Information Security (BMIS)
Definition
A holistic and business-oriented model that supports enterprise governance and management information security, and provides a common language for information security professionals and business management
Term
Capability Maturity Model (CMM)
Definition
Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc, immature processes, to disciplined, mature processes, with improved quality and
effectiveness.
Term
Certificate (certification) authority (CA)
Definition
A trusted third party that serves authentication infrastructures or enterprises and registers entities and
issues them certificates
Term
Certificate revocation list (CRL)
Definition
An instrument for checking the continued validity of the certificates for which the certification authority (CA) has responsibility. The CRL details digital certificates that are no longer valid. The time gap between two updates is very critical and is also a risk in digital certificates
verification.
Term
Certification practice statement (1 of 2)
Definition
A detailed set of rules governing the certificate authority's operations. It provides an understanding of the value and trustworthiness of certificates issued by a given certificate
authority (CA).
Term
Certification practice statement (2 of 2)
Definition
Stated in terms of the controls that an organization observes, the method it uses to validate the authenticity of certificate applicants and the CA's expectations of how its certificates may be used
Term
Chain of custody
Definition
A legal principle regarding the validity and integrity of evidence. It requires accountability for anything that will be used as evidence in a legal proceeding to ensure that it can be accounted for from the time it was collected until the time it is presented in a court of law. This includes documentation as to who had access to the evidence and when, as well as the ability to identify evidence as being the exact item that was recovered or tested. Lack of control over evidence can lead to it being discredited.
Chain of custody depends on the ability to verify that evidence could not have been tampered with. This is accomplished by sealing off the evidence, so it cannot be changed, and providing a documentary record of custody to prove that the evidence was, at all times, under strict
control and not subject to tampering.
Term
Chain of evidence
Definition
A process and record that shows who obtained the evidence, where and when the evidence was obtained, who secured the evidence and who had control or possession of the evidence. The "sequencing" of the chain of evidence follows this order: collection and identification, analysis, storage, preservation, presentation
in court, return to owner.
Term
Challenge/response token
Definition
A method of user authentication that is carried out through use of the Challenge Handshake Authentication Protocol (CHAP). When a user tries to log onto the server using CHAP, the server sends the user a "challenge," which is a random value. The user enters a password, which is used as an encryption key to encrypt the "challenge" and return it to the server. The server is aware of the password. It, therefore, encrypts the "challenge" value and compares it with the value received from the user. If the values match, the user is authenticated. The challenge/response activity continues throughout the session and this protects the session from password sniffing attacks. In addition, CHAP is not vulnerable to "man-in-the-middle" attacks because the challenge value is a random value that changes on each access attempt.
Term
Change management
Definition
A holistic and proactive approach to managing the
transition from a current to a desired organizational state
Term
Checksum (1 of 2)
Definition
A mathematical value that is assigned to a file and used to
"test" the file at a later date to verify that the data contained in the file have not been maliciously changed.
Term
Checksum (2 of 2)
Definition
A cryptographic checksum is created by performing a complicated series of mathematical operations (known as a cryptographic algorithm) that translates the data in the file into a fixed string of digits called a hash value, which is then used as the checksum. Without knowing which cryptographic algorithm was used to create the hash value, it is highly unlikely that an unauthorized person would be able to change data without inadvertently changing the corresponding checksum. Cryptographic checksums are used in data transmission and data storage. Cryptographic checksums are also known as message authentication codes, integrity check values, modification
detection codes or message integrity codes.
Term
Chief information officer (CIO)
Definition
The most senior official of the enterprise who is accountable for IT advocacy, aligning IT and business strategies, and planning, resourcing and managing the delivery of IT services, information and the deployment of associated human resources. In some cases, the CIO role has been expanded to become the chief knowledge officer (CKO) who deals in knowledge, not just
information. Also see chief technology officer.
Term
Chief information security officer (CISO)
Definition
Responsible for managing information risk, the information security program, and ensuring appropriate confidentiality, integrity and availability of information
assets
Term
Chief security officer (CSO)
Definition
Typically responsible for physical security in the
organization although increasingly the CISO and CSO roles are merged
Term
Chief technology officer (CTO)
Definition
The individual who focuses on technical issues in an organization
Term
Cloud computing
Definition
An approach using external services for convenient on- demand IT operations using a shared pool of configurable computing capability. Typical capabilities include infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS), e.g., networks, servers, storage, applications and services, that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics (on-demand self service, ubiquitous network access, location independent resource pooling, rapid elasticity, and measured service). It allows users to access technology-based services from the network cloud without knowledge of, expertise with, or control over, the technology infrastructure that supports them and provides four models for enterprise access (Private cloud,
Community cloud, Public cloud, and Hybrid cloud).
Term
COBIT 5
Definition
Formerly known as Control Objectives for Information and related Technology (CUBIT); now used only as the acronym in its fifth iteration. A complete, internationally accepted framework for governing and managing enterprise information and technology (IT) that supports enterprise executives and management in their definition and achievement of business goals and related IT goals. CUBIT describes five principles and seven enablers that support enterprises in the development, implementation, and continuous improvement and monitoring of goodlT-
related governance and management practices.
Term
...
Definition
Earlier versions of CUBIT focused on control objectives related to IT processes, management and control of IT processes and IT governance aspects. Adoption and use of the CUBIT framework are supported by guidance from a growing family of supporting products. (See www.isaca.org/cobit for more information.)
Term
COBIT 4.1 and earlier
Definition
Formerly known as Control Objectives for Information and related Technology (CUBIT). A complete, internationally accepted process framework for IT that supports business and IT executives and management in their definition and achievement of business goals and related IT goals by providing a comprehensive IT governance, management, control and assurance model. COBIT describes IT processes and associated control objectives, management guidelines (activities, accountabilities, responsibilities and performance metrics) and maturity models. CUBIT supports enterprise management in the development, implementation, continuous improvement and monitoring of good IT-
related practices.
Term
Common vulnerabilities and exposures (CVE)
Definition
A system that provides a reference method for publicly known information-security vulnerabilities and exposures. MITRE Corporation maintains the system, with funding from the National Cyber Security Division of the United
States Department of Homeland Security.
Term
Compensating control
Definition
An internal control that reduces the risk of an existing or
potential control weakness resulting in errors and omissions
Term
Computer forensics
Definition
The application of the scientific method to digital media to establish factual information for judicial review. This process often involves investigating computer systems to determine whether they are or have been used for illegal or unauthorized activities. As a discipline, it combines elements of law and computer science to collect and analyze data from information systems (e.g., personal computers, networks, wireless communication and digital storage devices) in a way that is admissible as evidence in
a court of law.
Term
Confidentiality
Definition
The protection of sensitive or private information from unauthorized disclosure
Term
Configuration management
Definition
The control of changes to a set of configuration items
over a system life cycle
Term
Content filtering
Definition
Controlling access to a network by analyzing the contents of the incoming and outgoing packets and either letting them pass or denying them based on a list of rules. Differs from packet filtering in that it is the data in the packet that are analyzed instead of the attributes of the packet itself (e.g., source/target IP address, transmission control
protocol [TCP] flags)
Term
Contingency plan
Definition
A plan used by an organization or business unit to
respond to a specific systems failure or disruption
Term
Continuous monitoring
Definition
The process implemented to maintain a current security status for one or more information systems or for the entire suite of information systems on which the operational mission of the enterprise depends. The process includes: 1) the development of a strategy to regularly evaluate selected IS controls/metrics, 2) recording and evaluating IS-relevant events and the effectiveness of the enterprise in dealing with those events, 3) recording changes to IS controls, or changes that affect IS risks, and 4) publishing the current security status to enable informationsharing decisions involving
the enterprise.
Term
Control center
Definition
Hosts the recovery meetings where disaster recovery
operations are managed
Term
Controls policy
Definition
A policy defining control operational and failure modes, e.g., fail secure, fail open, allowed unless specifically
denied, denied unless specifically permitted
Term
Corporate governance
Definition
The system by which enterprises are directed and controlled. The board of directors is responsible for the governance of their enterprise. It consists of the leadership and organizational structures and processes that ensure the enterprise sustains and extends strategies and objectives.
Term
COSO
Definition
Committee of Sponsoring Organizations of the Treadway Commission. Its 1992 report "Internal Control—Integrated Framework" is an internationally accepted standard for
corporate governance. See www.coso.org.
Term
Cost-benefit analysis
Definition
A systematic process for calculating and comparing
benefits and costs of a project, control or decision
Term
Countermeasures
Definition
Any process that directly reduces a threat or vulnerability
Term
Criticality
Definition
A measure of the impact that the failure of a system to
function as required will have on the organization.
Term
Criticality analysis
Definition
An analysis to evaluate resources or business functions to identify their importance to the organization, and the impact if a function cannot be completed or a resource is
not available
Term
Cryptographic algorithm
Definition
A well-defined computational procedure that takes
variable inputs, including a cryptographic key, and produces an output
Term
Cryptographic strength
Definition
A measure of the expected number of operations
required to defeat a cryptographic mechanism
Term
Cryptography
Definition
The art of designing, analyzing and attacking
cryptographic schemes
Term
Cyclical redundancy check
(CRC)
Definition
A method to ensure that data have not been altered after
being sent through a communication channel
Term
Damage evaluation
Definition
The determination of the extent of damage that is necessary to provide for an estimation of the recovery
time frame and the potential loss to the organization
Term
Data classification
Definition
The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification. Levels of sensitivity of data are assigned according to predefined categories as data are created, amended, enhanced, stored or transmitted. The classification level is an indication of the value or importance of the data to the organization.
Term
Data custodian
Definition
The individual(s) and/or department(s) responsible for the
storage and safeguarding of computerized data
Term
Data Encryption Standard (DES)
Definition
An algorithm for encoding binary data. It is a secret key cryptosystem published by the National Bureau of Standards (NBS), the predecessor of the US National Institute of Standards and Technology (NIST). DES and its variants have been replaced by the Advanced Encryption
Standard (AES).
Term
Data integrity
Definition
The property that data meet with a priority expectation of
quality and that the data can be relied on
Term
Data leakage
Definition
Siphoning out or leaking information by dumping
computer files or stealing computer reports and tapes
Term
Data leak protection (DLP)
Definition
A suite of technologies and associated processes that locate, monitor and protect sensitive information from
unauthorized disclosure
Term
Data mining
Definition
A technique used to analyze existing information, usually with the intention of pursuing new avenues to pursue
business
Term
Data normalization
Definition
A structured process for organizing data into tables in such a way that it preserves the relationships among the
data
Term
Data owner
Definition
The individual(s), normally a manager or director, who has
responsibility for the integrity, accurate reporting and use of computerized data
Term
Data warehouse
Definition
A generic term for a system that stores, retrieves and manages large volumes of data. Data warehouse software often includes sophisticated comparison and hashing
techniques for fast searches, as well as advanced filtering.
Term
Decentralization
Definition
The process of distributing computer processing to
different locations within an organization
Term
Decryption key
Definition
A digital piece of information used to recover plaintext from the corresponding ciphertext by decryption
Term
Defense in depth
Definition
The practice of layering defenses to provide added protection. Defense in depth increases security by raising the effort needed in an attack. This strategy places multiple barriers between an attacker and an
organization's computing and information resources.
Term
Degauss
Definition
The application of variable levels of alternating current for the purpose of demagnetizing magnetic recording media. The process involves increasing the alternating current field gradually from zero to some maximum value and back to zero, leaving a very low residue of magnetic
induction on the media. Degauss loosely means: to erase.
Term
Demilitarized zone (DMZ)
Definition
A screened (firewalled) network segment that acts as a buffer zone between a trusted and untrusted network. A DMZ is typically used to house systems such as web servers that must be accessible from both internal
networks and the Internet.
Term
Denial-of-service (DoS) attack
Definition
An assault on a service from a single source that floods it with so many requests that it becomes overwhelmed and is either stopped completely or operates at a significantly
reduced rate
Term
Digital certificate
Definition
A process to authenticate (or certify) a party's digital
signature; carried out by trusted third parties
Term
Digital code signing
Definition
The process of digitally signing computer code to ensure
its integrity
Term
Disaster declaration
Definition
The communication to appropriate internal and external parties that the disaster recovery plan is being put into
operation
Term
Disaster notification fee
Definition
The fee the recovery site vendor charges when the customer notifies them that a disaster has occurred and the recovery site is required. The fee is implemented to
discourage false disaster notifications.
Term
Disaster recovery plan (DRP)
Definition
A set of human, physical, technical and procedural resources to recover, within a defined time and cost, an activity interrupted by an emergency or disaster
Term
Disaster recovery plan desk checking
Definition
Typically a read-through of a disaster recovery plan without any real actions taking place. Generally involves a reading of the plan, discussion of the action items and
definition of any gaps that might be identified
Term
Disaster recovery plan walk- through
Definition
Generally a robust test of the recovery plan requiring that some recovery activities take place and are tested. A disaster scenario is often given and the recovery teams talk through the steps they would need to take to recover.
As many aspects of the plan should be tested as possible.
Term
Discretionary access control (DAC)
Definition
A means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that
permission (perhaps indirectly) on to any other subject.
Term
Disk mirroring
Definition
The practice of duplicating data in separate volumes on two hard disks to make storage more fault tolerant.
Mirroring provides data protection in the case of disk
failure because data are constantly updated to both disks.
Term
Distributed denial-of-service
(DDoS) attack
Definition
A denial-of-service (DoS) assault from multiple sources
Term
Domain name system (DNS)
Definition
A hierarchical database that is distributed across the Internet that allows names to be resolved into IP addresses (and vice versa) to locate services such as web
and e-mail servers
Term
Dual control
Definition
A procedure that uses two or more entities (usually persons) operating in concert to protect a system resource so that no single entity acting alone can access
that resource
Term
Due care
Definition
The level of care expected from a reasonable person of
similar competency under similar conditions
Term
Due diligence
Definition
The performance of those actions that are generally regarded as prudent, responsible and necessary to conduct a thorough and objective investigation, review and/or analysis
Term
Dynamic Host Configuration Protocol (DHCP)
Definition
A protocol used by networked computers (clients) to obtain IP addresses and other parameters such as the default gateway, subnet mask and IP addresses of domain name system (DNS) servers from a DHCP server. The DHCP server ensures that all IP addresses are unique (e.g., no IP address is assigned to a second client while the first client's assignment is valid [its lease has not expired]).
Thus, IP address pool management is done by the server
and not by a human network administrator.
Term
Electronic data interchange (EDI)
Definition
The electronic transmission of transactions (information) between two enterprises. EDI promotes a more efficient paperless environment. EDI transmissions can replace the use of standard documents, including invoices or
purchase orders.
Term
Electronic funds transfer (EFT)
Definition
The exchange of money via telecommunications. EFT refers to any financial transaction that originates at a terminal and transfers a sum of money from one account
to another.
Term
Encryption
Definition
The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm with a key) and producing an
encrypted message (ciphertext)
Term
Enterprise governance
Definition
A set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise's resources
are used responsibly.
Term
Exposure
Definition
The potential loss to an area due to the occurrence of an
adverse event
Term
External storage
Definition
The location that contains the backup copies to be used in case recovery or restoration is required in the event of a disaster
Term
Fail-over
Definition
The transfer of service from an incapacitated primary
component to its backup component
Term
Fail safe
Definition
Describes the design properties of a computer system
that allow it to resist active attempts to attack or bypass it
Term
Fall-through logic
Definition
An optimized code based on a branch prediction that predicts which way a program will branch when an
application is presented
Term
Firewall
Definition
A system or combination of systems that enforces a boundary between two or more networks typically forming a barrier between a secure and an open
environment such as the Internet
Term
Flooding
Definition
An attack that attempts to cause a failure in a system by providing more input than the system can process
properly
Term
Forensic copy
Definition
An accurate bit-for-bit reproduction of the information contained on an electronic device or associated media, whose validity and integrity has been verified using an
accepted algorithm
Term
Forensic examination
Definition
The process of collecting, assessing, classifying and documenting digital evidence to assist in the identification
of an offender and the method of compromise
Term
Guideline
Definition
A description of a particular way of accomplishing
something that is less prescriptive than a procedure
Term
Harden
Definition
To configure a computer or other network device to resist
attacks
Term
Hash function
Definition
An algorithm that maps or translates one set of bits into another (generally smaller) so that a message yields the same result every time the algorithm is executed using the same message as input. It is computationally infeasible for a message to be derived or reconstituted from the result produced by the algorithm or to find two different messages that produce the same hash result using the same algorithm.
Term
Help desk
Definition
A service offered via telephone/Internet by an organization to its clients or employees that provides information, assistance and troubleshooting advice regarding software, hardware or networks. A help desk is staffed by people who can either resolve the problem on their own or escalate the problem to specialized personnel. A help desk is often equipped with dedicated customer relationship management (CRM) software that
logs the problems and tracks them until they are solved.
Term
Honeypot
Definition
A specially configured server, also known as a decoy server, designed to attract and monitor intruders in a manner such that their actions do not affect production
systems
Term
Hot site
Definition
A fully operational offsite data processing facility
equipped with hardware and system software to be used in the event of a disaster
Term
Hypertext Transfer Protocol (HTTP)
Definition
A communication protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit hypertext markup language (HTML), extensible markup language
(XML) or other pages to the client browsers.
Term
I Identification
Definition
The process of verifying the identity of a user, process or device, usually as a prerequisite for granting access to
resources in an information system
Term
Impact analysis
Definition
A study to prioritize the criticality of information resources for the organization based on costs (or consequences) of adverse events. In an impact analysis, threats to assets are identified and potential business losses determined for different time periods. This assessment is used to justify the extent of safeguards that are required and recovery time frames. This analysis is the basis for establishing the
recovery strategy.
Term
Incident
Definition
Any event that is not part of the standard operation of a service and that causes, or may cause, an interruption to, or a reduction in, the quality of that service
Term
Incident handling
Definition
An action plan for dealing with intrusions, cybertheft, denial-of-service attack, fire, floods, and other security- related events. It is comprised of a six-step process: Preparation, Identification, Containment, Eradication,
Recovery, and Lessons Learned.
Term
Information security
Definition
Ensures that only authorized users (confidentiality) have access to accurate and complete information (integrity)
when required (availability)
Term
Information security governance
Definition
The set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise's resources
are used responsibly
Term
Information security program
Definition
The overall combination of technical, operational and procedural measures, and management structures implemented to provide for the confidentiality, integrity and availability of information based on business
requirements and risk analysis
Term
Integrity
Definition
The accuracy, completeness and validity of information
Term
Internal controls
Definition
The policies, procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and undesired events
will be prevented or detected and corrected
Term
Internet service provider (ISP)
Definition
A third party that provides individuals and organizations access to the Internet and a variety of other Internet-
related services
Term
Interruption window
Definition
The time the company can wait from the point of failure to the restoration of the minimum and critical services or applications. After this time, the progressive losses caused by the interruption are excessive for the organization.
Term
Intrusion detection
Definition
The process of monitoring the events occurring in a computer system or network to detect signs of unauthorized access or attack . Intrusion detection system (IDS) Inspects network and host security activity to identify suspicious patterns that may indicate a network or
system attack.
Term
Intrusion prevention system (IPS)
Definition
Inspects network and host security activity to identify suspicious patterns that may indicate a network or system attack and then blocks it at the firewall to prevent damage
to information resources
Term
IP Security (IPSec)
Definition
A set of protocols developed by the Internet Engineering Task Force (IETF) to support the secure exchange of
packets
Term
ISO/IEC 15504
Definition
ISO/IEC 15504 Information technology—Process assessment. ISO/IEC 15504 provides a framework for the assessment of processes. The framework can be used by organizations involved in planning, managing, monitoring, controlling and improving the acqu sition, supply, development, operation, evolution and support of
products and services.
Term
ISO/IEC 17799
Definition
Originally released as part of the British Standard for Information Security in 1999 and then as the Code of Practice for Information Security Management in October 2000, it was elevated by the International Organization for Standardization (ISO) to an international code of practice for information security management. This standard defines information's confidentiality, integrity and availability controls in a comprehensive information security management system. The latest version is ISO/IEC
17799:2005.
Term
ISO/IEC 27001
Definition
An international standard, released in 2005 and revised in 2006, that defines a set of requirements for an information security management system. Prior its adoption by the ISO, this standard was known as BS 17799 Part 2, which was originally published in 1999.
Term
ISO/IEC 27002
Definition
A code of practice that contains a structured list of suggested information security controls for organizations implementing an information security management system. Prior to its adoption by ISO/IEC, this standard
existed as BS 77799.
Term
ISO/IEC 31000
Definition
ISO 31000:2009 Risk management—Principles and guidelines. Provides principles and generic guidelines on risk management. It is industry- and sector-agnostic and can be used by any public, private or community
enterprise, association, group or individual.
Term
IT governance
Definition
The responsibility of executives and the board of directors; consists of the leadership, organizational structures and processes that ensure that the enterprise's IT sustains and extends the organization's strategies and
objectives
Term
IT steering committee
Definition
An executive management-level committee that assists the executive in the delivery of the IT strategy, oversees day to day management of IT service delivery and IT
projects and focuses on implementation aspects
Term
IT strategic plan
Definition
A long term plan( i.e., three to five year horizon) in which business and IT management cooperatively describe how IT resources will contribute to the enterprise's strategic
objectives (goals)
Term
IT strategy committee
Definition
A committee at the level of the board of directors to ensure that the board is involved in major IT matters and decisions. The committee is primarily accountable for managing the portfolios of IT enabled investments, IT services and other IT resources. The committee is the
owner of the portfolio.
Term
Key goal indicator (KGI)
Definition
A measure that tells management, after the fact, whether an IT process has achieved its business requirements; usually expressed in terms of information criteria
Term
Key performance indicator (KPI)
Definition
A measure that determines how well the process is performing in enabling the goal to be reached. A KPI is a lead indicator of whether a goal will likely be reached, and a good indicator of capability, practices and skills. It measures an activity goal, which is an action that the process owner must take to achieve effective process
performance.
Term
Key risk indicator (KRI)
Definition
A subset of risk indicators that are highly relevant and
possess a high probability of predicting or indicating important risk
Term
Least privilege
Definition
The principle of allowing users or applications the least
amount of permissions necessary to perform their intended function
Term
Mail relay server
Definition
An electronic mail (email) server that relays messages so
that neither the sender nor the recipient is a local user
Term
Malicious code
Definition
Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user
into executing other malicious logic
Term
Malware
Definition
Software designed to infiltrate, damage or obtain information from a computer system without the owner's consent Malware is commonly taken to include computer viruses, worms, Trojan horses, spyware and adware.
Spyware is generally used for marketing purposes and, as such, is not malicious, although it is generally unwanted.
Spyware can, however, be used to gather information for
identity theft or other clearly illicit purposes.
Term
Mandatory access control (MAC)
Definition
A means of restricting access to data based on varying degrees of security requirements for information contained in the objects and the corresponding security clearance of users or programs acting on their behalf.
Term
Man-in-the-middle attack (MitM)
Definition
An attack strategy in which the attacker intercepts the communication stream between two parts of the victim system and then replaces the traffic between the two components with the intruder's own system, eventually
assuming control of the communication.
Term
Masqueraders
Definition
Attackers that penetrate systems by using the identity of
legitimate users and their login credentials
Term
Maximum tolerable outages
(MTO)
Definition
Maximum time the organization can support processing in
alternate mode
Term
Media access control (MAC)
Definition
Applied to the hardware at the factory and cannot be modified, MAC is a unique, 48-bit, hard-coded address of a physical layer device, such as an Ethernet local area
network (LAN) or a wireless network card.
Term
Message authentication code
Definition
An American National Standards Institute (ANSI) standard checksum that is computed using the Data Encryption
Standard (DES)
Term
Message digest
Definition
A cryptographic checksum, typically generated for a file that can be used to detect changes to the file; Secure Hash Algorithm-1 (SHA-1) is an example of a message
digest algorithm.
Term
Mirrored site
Definition
An alternate site that contains the same information as the original. Mirror sites are set up for backup and disaster recovery as well as to balance the traffic load for numerous download requests. Such download mirrors are often placed in different locations throughout the
Internet.
Term
Mobile site
Definition
The use of a mobile/temporary facility to serve as a business resumption location. They can usually be delivered to any site and can house information
technology and staff
Term
Monitoring policy
Definition
Rules outlining or delineating the way in which information about the use of computers, networks, applications and information is captured and interpreted.
Term
Multipurpose Internet mail extension (MIME)
Definition
A specification for formatting non-ASCII messages so that they can be sent over the Internet. Many email clients now support MIME, which enables them to send and receive graphics, audio and video files via the Internet mail system. In addition, MIME supports messages in character
sets other than ASCII.
Term
Net present value (NPV)
Definition
Calculated by using an after-tax discount rate of an investment and a series of expected incremental cash outflows (the initial investment and operational costs) and cash inflows (cost savings or revenues) that occur at regular periods during the life cycle of the investment. To arrive at a fair NPV calculation, cash inflows accrued by the business up to about five years after project
deployment also should be taken into account.
Term
Network address translation (NAT)
Definition
Basic NATs are used when there is a requirement to interconnect two IP networks with incompatible addressing. However, it is common to hide an entire IP address space, usually consisting of private IP addresses, behind a single IP address (or in some cases a small group of IP addresses) in another (usually public) address space. To avoid ambiguity in the handling of returned packets, a one-to-many NAT must alter higher level information such as Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) ports in outgoing communications and must maintain a translation table so that return packets
can be correctly translated back.
Term
Network-based intrusion detection (NID)
Definition
Provides broader coverage than host-based approaches but functions in the same manner detecting attacks using either an anomaly-based or signature-based approach or
both
Term
Nonintrusive monitoring
Definition
The use of transported probes or traces to assemble information, track traffic and identify vulnerabilities
Term
Nonrepudiation
Definition
The assurance that a party cannot later deny originating data; that is, it is the provision of proof of the integrity and origin of the data and can be verified by a third party. A
digital signature can provide nonrepudiation.
Term
Offline files
Definition
Computer file storage media not physically connected to the computer; typically tapes or tape cartridges used for
backup purposes
Term
Open Shortest Path First
(OSPF)
Definition
A routing protocol developed for IP networks. It is based
on the shortest path first or link state algorithm.
Term
Open Source Security
Testing Methodology
Definition
An open and freely available methodology and manual
for security testing
Term
Outcome measure
Definition
Represents the consequences of actions previously taken; often referred to as a lag indicator. An outcome measure frequently focuses on results at the end of a time period and characterizes historical performance. It is also referred to as a key goal indicator (KGI) and is used to indicate whether goals have been met. Can be measured
only after the fact and, therefore, is called a lag indicator.
Term
Packet
Definition
Data unit that is routed from source to destination in a packetswitched network. A packet contains both routing information and data. Transmission Control Protocol/Internet Protocol (TCP/IP) is such a packet-
switched network.
Term
Packet filtering
Definition
Controlling access to a network by analyzing the attributes of the incoming and outgoing packets, and either letting them pass or denying them based on a list of
rules
Term
Packet sniffer
Definition
Software that observes and records network traffic
Term
Packet switched network
Definition
Individual packets follow their own paths through the network from one endpoint to another and reassemble at
the destination.
Term
Partitions
Definition
Major divisions of the total physical hard disk space
Term
Passive response
Definition
A response option in intrusion detection in which the system simply reports and records the problem detected,
relying on the user to take subsequent action
Term
Password cracker
Definition
A tool that tests the strength of user passwords searching for passwords that are easy to guess. It repeatedly tries words from specially crafted dictionaries and often also generates thousands (and in some cases, even millions) of
permutations of characters, numbers and symbols.
Term
Penetration testing
Definition
A live test of the effectiveness of security defenses
through mimicking the actions of real-life attackers
Term
Personally Identifiable
Information (PII)
Definition
Information that can be used alone or with other sources
to uniquely identify, contact or locate a single individual
Term
Pharming
Definition
This is a more sophisticated form of a man-in-the-middle (MITM) attack. A user's session is redirected to a masquerading website. This can be achieved by corrupting a domain name system (DNS) server on the Internet and pointing a URL to the masquerading web
site's IP address.
Term
Phishing
Definition
This is a type of electronic mail (email) attack that attempts to convince a user that the originator is genuine, but with the intention of obtaining information for use in social engineering. Phishing attacks may take the form of masquerading as a lottery organization advising the recipient or the user's bank of a large win; in either case, the intent is to obtain account and personal identification number (PIN) details. Alternative attacks may seek to obtain apparently innocuous business information, which
may be used in another form of active attack.
Term
Policy
Definition
Overall intention and direction as formally expressed by
management
Term
Port
Definition
A hardware interface between a CPU and a peripheral device. Can also refer to a software (virtual) convention that allows remote services to connect to a host operating system in a structured manner
Term
Privacy
Definition
Freedom from unauthorized intrusion or disclosure of
information an individual
Term
Private key
Definition
A mathematical key (kept secret by the holder) used to create digital signatures and, depending on the algorithm, to decrypt messages or files encrypted (for
confidentiality) with the corresponding public key
Term
Procedure
Definition
A document containing a detailed description of the steps necessary to perform specific operations in conformance with applicable standards. Procedures are defined as part
of processes.
Term
Proxy server
Definition
A server that acts on behalf of a user. Typically proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps perform additional authentication, and then complete a connection to a
remote destination on behalf of the user.
Term
Public key
Definition
In an asymmetric cryptographic scheme, the key that may be widely published to enable the operation of the
scheme
Term
Reciprocal agreement
Definition
Emergency processing agreements among two or more organizations with similar equipment or applications.
Typically, participants promise to provide processing time
to each other when an emergency arises.
Term
Recovery action
Definition
Execution of a response or task according to a written
procedure
Term
Recovery point objective (RPO)
Definition
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time to which it is acceptable to recover data. It effectively quantifies the permissible amount of data loss
in case of interruption.
Term
Recovery time objective (RTO)
Definition
The amount of time allowed for the recovery of a business function or resource after a disaster occurs
Term
Redundant Array of Inexpensive Disks (RAID)
Definition
Provides performance improvements and fault-tolerant capabilities, via hardware or software solutions, by writing to a series of multiple disks to improve performance
and/or save large files simultaneously
Term
Redundant site
Definition
A recovery strategy involving the duplication of key information technology components, including data or other key business processes, whereby fast recovery can
take place
Term
Request for proposal (RFP)
Definition
A document distributed to software vendors requesting
them to submit a proposal to develop or provide a software product
Term
Residual risk
Definition
The remaining risk after management has implemented
risk response
Term
Resilience
Definition
The ability of a system or network to resist failure or to recover quickly from any disruption, usually with minimal
recognizable effect
Term
Return on investment (ROI)
Definition
A measure of operating performance and efficiency, computed in its simplest form by dividing net income by
the total investment over the period being considered
Term
Return on security investment (ROSI)
Definition
An estimate of return on security investment based on
how much will be saved by reduced losses divided by the investment
Term
Risk
Definition
The combination of the probability of an event and its
consequence. (ISO/IEC 73). Risk has traditionally been expressed as Threats x Vulnerabilities = Risk.
Term
Risk assessment
Definition
A process used to identify and evaluate risk and potential effects. Risk assessment includes assessing the critical functions necessary for an organization to continue business operations, defining the controls in place to reduce organization exposure and evaluating the cost for such controls. Risk analysis often involves an evaluation of the probabilities of a particular event.
Term
Risk avoidance
Definition
The process for systematically avoiding risk, constituting
one approach to managing risk
Term
Risk mitigation
Definition
The management and reduction of risk through the use of
countermeasures and controls
Term
Risk tolerance
Definition
The acceptable level of variation that management is
willing to allow for any particular risk while pursuing its objectives
Term
Risk transfer
Definition
The process of assigning risk to another organization,
usually through the purchase of an insurance policy or outsourcing the service
Term
Robustness
Definition
The ability of systems to withstand attack, operate reliably across a wide range of operational conditions and to fail
gracefully outside of the operational range
Term
Role-based access control
Definition
Assigns users to job functions or titles. Each job function
or title defines a specific authorization level.
Term
Root cause analysis
Definition
A process of diagnosis to establish origins of events,
which can be used for learning from consequences, typically of errors and problems
Term
Rootkit
Definition
A software suite designed to aid an intruder in gaining
unauthorized administrative access to a computer system
Term
Secret key
Definition
A cryptographic key that is used with a secret key (symmetric) cryptographic algorithm, that is uniquely associated with one or more entities and is not made public. The same key is used to both encrypt and decrypt data. The use of the term "secret" in this context does not imply a classification level, but rather implies the need to
protect the key from disclosure.
Term
Secure hash algorithm (SHA)
Definition
A hash algorithm with the property that is computationally infeasible 1) to find a message that corresponds to a given message digest, or 2) to find two different messages that produce the same message digest
Term
Security information and event management (SIEM)
Definition
SIEM solutions are a combination of the formerly disparate product categories of SIM (security information management) and SEM (security event management).
SIEM technology provides realtime analysis of security alerts generated by network hardware and applications. SIEM solutions come as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes. Capabilities
include:
Term
Data aggregation:
Definition
SIEM/LM (log management) solutions aggregate data from many sources, including network, security, servers, databases and applications, providing the ability to consolidate monitored data to help avoid missing crucial events. Correlation: Looks for common attributes, and links events together into meaningful bundles. This technology provides the ability to perform a variety of correlation techniques to integrate different sources, in order to turn data into useful information. Alerting: The automated analysis of correlated events and production of alerts, to notify recipients of immediate issues.
Dashboards: SIEM/LM tools take event data and turn them into informational charts to assist in seeing patterns, or identifying activity that is not forming a standard pattern. Compliance: SIEM applications can be employed to automate the gathering of compliance data, producing reports that adapt to existing security, governance and auditing processes. Retention: SIEM/SIM solutions employ long-term storage of historical data to facilitate correlation of data over time, and to provide the retention
necessary for compliance requirements.
Term
Security metrics
Definition
A standard of measurement used in management of securityrelated activities
Term
Segregation/separation of duties (SoD)
Definition
A basic internal control that prevents or detects errors and irregularities by assigning to separate individuals the responsibility for initiating and recording transactions and for the custody of assets. Segregation/separation of duties is commonly used in large IT organizations so that no single person is in a position to introduce fraudulent or
malicious code without detection.
Term
Sensitivity
Definition
A measure of the impact that improper disclosure of
information may have on an organization
Term
Service delivery objective (SDO)
Definition
Directly related to business needs, SDO is the level of services to be reached during the alternate process mode
until the normal situation is restored
Term
Service level agreement (SLA)
Definition
An agreement, preferably documented, between a service provider and the customer(s)/user(s) that defines minimum performance targets for a service and how they
will be measured
Term
Session key
Definition
A single-use symmetric key used for a defined period of communication between two computers, such as for the duration of a single communication session or transaction
set
Term
Shell programming
Definition
A script written for the shell, or command line interpreter, of an operating system; it is often considered a simple domain-specific programming language. Typical operations performed by shell scripts include file manipulation, program execution and printing text.
Usually, shell script refers to scripts written for a UNIX shell, while COMMAND.COM (DOS) and cmd.exe (Windows) command line scripts are usually called batch files.Others, such as AppleScript, add scripting capability to computing environments lacking a command line interface. Other examples of programming languages primarily intended for shell scripting include digital command language (DCL) and job control language (JCL).
Term
Sniffing
Definition
The process by which data traversing a network are
captured or monitored
Term
Social engineering
Definition
An attack based on deceiving users or administrators at the target site into revealing confidential or sensitive
information
Term
Split knowledge/split key
Definition
A security technique in which two or more entities separately hold data items that individually convey no knowledge of the information that results from combining the items; a condition under which two or more entities separately have key components that individually convey no knowledge of the plaintext key that will be produced when the key components are combined in the
cryptographic module
Term
Spoofing
Definition
Faking the sending address of a transmission in order to
gain illegal entry into a secure system
Term
Standard
Definition
A mandatory requirement, code of practice or specification approved by a recognized external standards organization, such as International Organization
for Standardization (ISO)
Term
Symmetric key encyryption
Definition
System in which a different key (or set of keys) is used by each pair of trading partners to ensure that no one else can read their messages. The same key is used for
encryption and decryption.
Term
System owner
Definition
Person or organization having responsibility for the development, procurement, integration, modification, operation and maintenance, and/or final disposition of an
information system
Term
Threat
Definition
Anything (e.g., object, substance, human) that is capable of acting against an asset in a manner that can result in harm. A potential cause of an unwanted incident. (ISO/IEC
13335)
Term
Threat agent
Definition
Methods and things used to exploit a vulnerability. Examples include determination, capability, motive and resources.
Term
Threat analysis
Definition
An evaluation of the type, scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against information assets. The threat analysis usually also defines the level of
threat and the likelihood of it materializing.
Term
Threat assessment
Definition
The identification of types of threats to which an
organization might be exposed
Term
Threat event
Definition
Any event where a threat element/actor acts against an asset in a manner that has the potential to directly result in
harm
Term
Threat model
Definition
Used to describe a given threat and the harm it could to
do a system if it has a vulnerability
Term
Threat vector
Definition
The method a threat uses to exploit the target
Term
Token
Definition
A device that is used to authenticate a user, typically in addition to a user name and password. A token is usually a device the size of a credit card that displays a pseudo
random number that changes every few minutes.
Term
Total cost of ownership (TCO)
Definition
Includes the original cost of the computer plus the cost of: software, hardware and software upgrades, maintenance, technical support, training, and certain
activities performed by users
Term
Trusted system
Definition
A system that employs sufficient hardware and software assurance measures to allow its use for processing simultaneously a range of sensitive or classified
information
Term
Tunneling
Definition
Commonly used to bridge between incompatible hosts/routers or to provide encryption; a method by which one network protocol encapsulates another
protocol within itself
Term
Two-factor authentication
Definition
The use of two independent mechanisms for authentication, (e.g., requiring a smart card and a password); typically the combination of something you know, are or have
Term
Uniform resource locator (URL)
Definition
The global address of documents and other resources on the World Wide Web. The first part of the address indicates what protocol to use; the second part specifies the IP address or the domain name where the resource is
located (e.g., http://www. isaca.org).
Term
Virtual private network (VPN)
Definition
A secure private network that uses the public telecommunications infrastructure to transmit data. In contrast to a much more expensive system of owned or leased lines that can only be used by one company, VPNs are used by enterprises for both extranets and wide areas of intranets. Using encryption and authentication, a VPN encrypts all data that pass between two Internet points,
maintaining privacy and security.
Term
Virus signature files
Definition
The file of virus patterns that are compared with existing
files to determine if they are infected with a virus or worm
Term
Warm site
Definition
Similar to a hot site, but not fully equipped with all of the
necessary hardware needed for recovery
Term
Web hosting
Definition
The business of providing the equipment and services required to host and maintain files for one or more web sites and provide fast Internet connections to those sites. Most hosting is "shared," which means that web sites of multiple companies are on the same server to
share/reduce costs.
Term
Web server
Definition
Using the client-server model and the World Wide Web's
Hypertext Transfer Protocol (HTTP), Web server is a software program that serves web pages to users.
Term
Wide area network (WAN)
Definition
A computer network connecting different remote locations that may range from short distances, such as a floor or building, to long transmissions that encompass a large region or several countries
Term
Voice-over IP (VoIP)
Definition
Also called IP Telephony, Internet Telephony and Broadband Phone, a technology that makes it possible to have a voice conversation over the Internet or over any dedicated Internet Protocol (IP) network instead of over
dedicated voice transmission lines
Term
Vulnerability
Definition
A weakness in the design, implementation, operation or internal controls in a process that could be exploited to
violate system security
Term
Vulnerability analysis
Definition
A process of identifying and classifying vulnerabilities
Term
Worm
Definition
A programmed network attack in which a self-replicating program does not attach itself to programs, but rather
spreads independently of users' action
Term
Wi-Fi protected access 2 (WPA2)
Definition
The replacement security method for WPA for wireless networks that provides stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Based on the ratified IEEE 802.11 i standard, WPA2 provides government-grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant advanced encryption standard (AES) encryption algorithm and 802.1X-based authentication.
Term
ISC2 Ethics: PAPA
Definition
Protect, Act, Provide, Advance.
Term
CIA
Definition
Confidentiality, Integrity, Availability
Term
Due Diligence:
Definition
Do Detect
Term
Due Care:
Definition
Do correct.
Term
U Should Count Six Tauntauns
Definition
Unclassified,
Sensitive But Unclassified, Classified, Secret, Top Secret.
Term
Defense in Depth:
Definition
Layering, or Onion defense.
Term
Security through obscurity
Definition
Data Hiding.
Term
RMF: “Crime Scene Investigators Always Act Modestly
Definition
Categorize,
Select, Implement, Assess, Authorize, Maintain
Term
COBIT
Definition
Has IT in it; IT governance
Term
ARO
Definition
Annualized Rate of Occurrence
Term
SLE
Definition
Single Loss Expectancy
Term
ALE
Definition
Annual Loss Expectancy
Term
AV
Definition
Assesst Value
Term
EF
Definition
Exposure Factors
Term
ISO
Definition
International Organization for Standardization
Term
ISO Raging Crackheads Risk Health
Definition
Requirements(ISO27001)Code of practice, Risk
Management (ISO27002), Health (ISO 27799).
Term
Security Model
Definition
Simple/R = read ; */W = write ; U = UP ; D = DOWN
Bell LaPadula:
Term
Bell LaPadula:
Definition
Confidentiality – Simple N R U || * N W D || Strong * N R/W
U/D.
Term
Biba:
Definition
Integrity – Simple N R D || * N W U || Invocation N R/W U.
Term
Access Control types: 2C - 3D - PR
Definition
corrective compensating, detective
deterrent directive, preventative recovering.
Term
Hashing
Definition
HA or MD
Term
Asymmetric - DEREK-Q
Definition
Diffie, El Gamal, RSA, ECC, Knapsack, Quantum
Term
Symmetric
Definition
2fish, 3DES, Blowfish, RC5, AES, IDEA, DES, Skipjack
Term
Ciphers
Definition
Stream = RC4 / Block - Everything else.
Term
Fire Extinguisher Classes:
Definition
A (Ash) Combustible, B (Boil) Liquid, C (Current)
Electrical, D (Dent) Metal, K (Kitchen) Oil/Fat.
Term
CPU Pipelining order: FDEW
Definition
Fetch, Decode, Execute, Write
Term
OSI Model
Definition
Physical, Datalink, Network, Transport, Session, Presentation, Application
Term
OSI Model: Layer 1-7
Definition
Please Do Not Throw Sausage Pizza Away
Term
OSI Model: Layer 7-1
Definition
All People Seem To Need Data Processing.
Term
TCP/IP Model: NITA
Definition
Network access, Internet, Transport, Application.
Term
Threat Modeling: STRIDE
Definition
Spoofing, Tampering, Repudiation, Information disclosure, DoS, Escalation of
privilege
Term
Threat Modeling: DREAD
Definition
Damage, Reproducibility, Exploitability, Affected users, Discoverability
Term
4 Ds of Physical Security
Definition
Deter → Deny → Detect → Delay
Term
EAL
Definition
Evaluation Assurance Level
Term
EAL: FSMM-SSF
Definition
For Sure My Mother-So Sweet Forever.
Term
EAL: FSMM-SSVF
Definition
Fun Stress Method Medical-Doctors Seem Somewhat Verifiably Foolish(Functionally, Structurally, Methodically, Methodically Designed, Semi-formally,
Semi-formally Designed, Verified, Formally Verified)
Term
Multi-Factor Authentication
Definition
Something you know, something you have, something you are.
Term
Incident Response Forensics: PDRMR3L
Definition
Prepare, Detect, Response, Mitigate,
Reporting, Recovery, Remediation, Lesson Learned.
Term
IDEAL
Definition
Initiating, Diagnosing, Establishing, Acting, Learning
Term
DHCP: DORA
Definition
DHCP: DORA - Discover, Offer, Request, ACK.
Term
The Ring Model-VM KODU
Definition
1 VM hosts, 0 Kernel, 1 Operating System, 2
Drivers, 3 User
Term
TCP Header Flags
Unskilled Attackers Pester
Real Security Folks
Definition
URG ACK PSH RST SYN FIN
Term
Digital forensics model:
I Prefer Coffee Everytime Anyone Provides
Donuts
Definition
Identification, Preservation, Collection, Examination, Analysis,
Presentation, Decision
Term
Change Management Steps:
Definition
RRA/RTID Request, Review, Approve or
Reject, Test, Implement, Document.
Term
The 7 steps of a cyber-attack: RSA ESA O
Definition
Reconnaissance, Scanning,
Access and Escalation, Exfiltration, Sustainment, Assault, Obfuscation
Term
BCP Steps:
Definition
BCP policy → BIA → Identify preventive controls → Develop
recovery strategies → Develop DRP → DRP training/testing → BCP/DRP
maintenance
Term
SDLC2: “I Reckon All Dem Dere Taters’ Really Delicious”
Definition
Initiation,
Requirements, Architecture, Design, Develop, Testing, Release,
Disposal.
Term
ACID
Definition
Atomic, Consistency, Isolation, Durability
Term
SW-CMM
I Ran Down My Ostrich
Definition
Initial, Repeatable, Defined,
Managed, Optimized.
Term
SDLC1: IDIOD
Don’t be an IDIOD
Definition
Initiation, Design, Implement,
Operations, Disposal
Term
CEO
Definition
Chief Executive Officer.
Term
CTO
Definition
CTO: Chief Technology Officer.
Term
CSO
Definition
Chief Security Officer.
Term
CISO
Definition
Chief Information Security Officer.
Term
CFO
Definition
Chief Financial Officer.
Term
CIO
Definition
Chief Information Officer.
Term
PCI-DSS
Definition
Payment Card Industry Data
Security Standard
Term
OCTAVE
Self-Directed Risk Management
Definition
Operationally Critical Threat, Asset, and Vulnerability Evaluation
Term
COBIT
Goals for IT
Definition
Control Objectives for Information and related Technology
Term
COSO
Goals for the entire organization
Definition
Committee of Sponsoring Organizations.
Term
FRAP
Internal
Definition
Facilitated Risk Analysis Process
Term
Security Governance Priciples
Vaules
Definition
What are our values? Ethics, Principles, Beliefs.
Term
Security Governance Priciples
Vision
Definition
What do we aspire to be? Hope and Ambition.
Term
Security Governance Priciples
Mission
Definition
Who do we do it for? Motivation and Purpose.
Term
Security Governance Priciples
Strategic Objectives
Definition
How are we going to progress? Plans, goals, and sequencing.
Term
Security Governance Priciples
Action & KPI's
Definition
What do we need to do and how do we know when we achieved it? Actions, Recourses, Outcomes, Owners, and Timeframes
Term
OPEX
Definition
Operating Expense :
is the ongoing cost for running a product, business, or system. (Keeping the lights on)
Term
CAPEX:
Definition
Capital Expenditure
is the money a company spends to buy, maintain, or improve its fixed assets, such as buildings, vehicles, equipment, or land
Term
KGI
Definition
Key Goal Indicators
Define measures that tell management, after the fact – whether an IT process has achieved its business requirements
Term
KPI
Definition
Key Performance Indicators
Define measures that determine how well the IT process is performing in enabling the goal to be reached
Term
KRI
Definition
Key Risk Indicators
Metrics that demonstrate the risks that an organization is facing or how risky an activity is.
They are the mainstay of measuring adherence to and establishing enterprise risk appetite.
Key risk indicators are metrics used by organizations to provide an early signal of increasing risk exposures in various areas of the enterprise.
KRI gives an early warning to identify potential event that may harm continuity of the activity/project
Term
RACI
Definition
Responsible, Accountable, Consulted, Informed
Supporting users have an ad free experience!