Term
|
Definition
a technique used to compromise a system. |
|
|
Term
|
Definition
a condition or state of being exposed. In information security, it exists when a vulnerability known to an attacker is present. |
|
|
Term
|
Definition
a single instance of an information asset suffering damage or unintended or unauthorized modification or disclosure. |
|
|
Term
protection profile or security posture |
|
Definition
the entire set of controls and safguards, including policy, education, training and awareness, and technology, that the organization implements to protect the asset. |
|
|
Term
|
Definition
the probability that somethign unwanted will happen. Orgs. must minimize this to match their risk appetite. |
|
|
Term
|
Definition
the quantity and nature of risk the organization is willing to accept. |
|
|
Term
|
Definition
a category fo objects, persons, or other entities that presents a danger to an asset. They are always present and can be purposeful or undirected. |
|
|
Term
|
Definition
the specific instance or a component of a threat. |
|
|
Term
|
Definition
a weaknesses or fault in a system or protection mechanism that opens it to attack or damage. |
|
|
Term
|
Definition
enables authorized users to access information without interference or obstruction and to receive it in the required format. |
|
|
Term
|
Definition
information has ____ when it is free from mistakes or errors and it has the value that the end user expects. If information has been intentionally or unintentionally modified, it no longer is accurate |
|
|
Term
|
Definition
the quality or state of being genuine or original, rahter than a reproduction or fabrication. |
|
|
Term
|
Definition
the act of sending an e-mail message with a modified field, is a problem for many people today, because often the modified field is the address fo the originator. |
|
|
Term
|
Definition
when an attacker attempts to obtain personal or financial information using fraudulent means, most often by posing as another individual or organization. |
|
|
Term
|
Definition
when information is protected from disclosure or exposure to unauthorized individuals or systems. It ensures that only those with the rights and privileges to access information are able to do so. |
|
|
Term
|
Definition
taking bits and pieces of information instead of all the required information to avoid detection. |
|
|
Term
|
Definition
information has this when it is whole, complete, and uncorrupted. It is threatened with the information is exposed to corruption, damage, destruction, or other disruption of its authentic state. |
|
|
Term
|
Definition
a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a hash value. |
|
|
Term
|
Definition
the quality or state of having value for some purpose or end. |
|
|
Term
|
Definition
the quality or state of ownership or control. |
|
|
Term
|
Definition
information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems. This is often referred to as a ____. |
|
|
Term
|
Definition
in which the project is initiated by upper-level managers who issue policy, procedures and processes, dictate the goals and expected outcomes, and determine accountability of reach required action |
|
|
Term
Systems development life cycle |
|
Definition
a methodology for the design and implementation of an information system. |
|
|
Term
|
Definition
a formal approach to solving a problem by means of a structured sequence of procedures. |
|
|
Term
|
Definition
illustrates that each phase of SDLC begins with the results and information gained from the previous phase. |
|
|
Term
Investigation; Analysis; Logical Design; Physical Design; Implementation; Maintenance and Change |
|
Definition
What are the six phases of Systems development life cycle (SDLC) |
|
|
Term
|
Definition
the most important phases of SDLC |
|
|
Term
|
Definition
This phase of SDLC consists primarily of assessments of the organization, the status of current systems, and the capability to support the proposed systems. |
|
|
Term
|
Definition
In this phase of SDLC, the information gained from the analysis phase is used to begin creating a solution system for a business problem. |
|
|
Term
|
Definition
During this phase of SDLC, specific technologies are selected to support the alternatives identified and evaluated in the logical phase |
|
|
Term
|
Definition
During this phase of SDLC, any needed software is created or purchased. |
|
|
Term
|
Definition
During this phase of SDLC, consists fo tasks necessary to support and modify the system for the remainder of its useful life cycle. |
|
|
Term
The Security Systems Development Life Cycle. (SecSDLC) |
|
Definition
This is used to identify specific threats and creating controls to counter them. |
|
|
Term
|
Definition
the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person's intellectual property may or may not involve royalty payments or permissions, but should always include proper credit to the source. |
|
|
Term
|
Definition
the unlawful use or duplication of software-based intellectual property |
|
|
Term
Deliberate Software Attacks |
|
Definition
Occurs when an individual or group designs and deploys software to attack a system |
|
|
Term
Malicious code, malicious software, Malware |
|
Definition
Software components or programs are designed to damage, destroy, or deny service to the target systems |
|
|
Term
|
Definition
segments of code that attaches itself to an existing program and takes control of that program's access to the targeted computer |
|
|
Term
|
Definition
Virus which is embedded in automatically executing macro code used by word processors, spread sheets, and database applications. |
|
|
Term
|
Definition
Virus which infects the key operating system files located in a computer's boot sector. |
|
|
Term
|
Definition
A malicious program that replicates itself constantly, without requiring another program environment. |
|
|
Term
|
Definition
Software programs that hide their true nature and reveal their designed behavior only when activated. |
|
|
Term
|
Definition
Allows the attacker to access the system at will with special privileges |
|
|
Term
|
Definition
A treat that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. |
|
|
Term
|
Definition
Damage to the physical materials used to send and recieve data can cause ____ |
|
|
Term
|
Definition
the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person's intellectual property may or may not involve royalty payments or permissions, but should always include proper credit to the source. |
|
|
Term
|
Definition
the unlawful use or duplication of software-based intellectual property |
|
|
Term
Deliberate Software Attacks |
|
Definition
Occurs when an individual or group designs and deploys software to attack a system |
|
|
Term
Malicious code, malicious software, Malware |
|
Definition
Software components or programs are designed to damage, destroy, or deny service to the target systems |
|
|
Term
|
Definition
segments of code that attaches itself to an existing program and takes control of that program's access to the targeted computer |
|
|
Term
|
Definition
Virus which is embedded in automatically executing macro code used by word processors, spread sheets, and database applications. |
|
|
Term
|
Definition
Virus which infects the key operating system files located in a computer's boot sector. |
|
|
Term
|
Definition
A malicious program that replicates itself constantly, without requiring another program environment. |
|
|
Term
|
Definition
Software programs that hide their true nature and reveal their designed behavior only when activated. |
|
|
Term
|
Definition
Allows the attacker to access the system at will with special privileges |
|
|
Term
|
Definition
A treat that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. |
|
|
Term
|
Definition
Damage to the physical materials used to send and recieve data can cause ____ |
|
|
Term
|
Definition
agreement between web hosting services that provide minimum service levels |
|
|
Term
|
Definition
experince a momentary increase in power levels |
|
|
Term
|
Definition
experience a prolonged increase |
|
|
Term
|
Definition
experience a momentary low in power level |
|
|
Term
|
Definition
experience a prolonged decrease in voltage |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
legal techniques used to access the information about a company and/or clients |
|
|
Term
|
Definition
when information gatherers employ techniques that cross the threshold of what is legal or ethical. |
|
|
Term
|
Definition
people who use and create computer software to gain access to information illegally. |
|
|
Term
|
Definition
unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. |
|
|
Term
expert hacker/elite hacker |
|
Definition
They develop software scripts and program exploits used by those in the second category, the notice hacker. |
|
|
Term
|
Definition
using a known or previously unknown and newly discovered access mechanism, an attacker can gain access to a system or network resource. |
|
|
Term
|
Definition
attempting to reverse calculte a password |
|
|
Term
|
Definition
the application of computing and network resources to try every possible combination of options a password |
|
|
Term
|
Definition
the type of password attack narrows the field by selecting specific accounts to attack and uses a list of commonly used passwords to guess with |
|
|
Term
|
Definition
the attacker send a large number of connection or information requests to a target. So many requests are made that the target system cannot handle them successfully along with other, legitimate requests for service. This may result in a system crash or merely an inability to perform ordinary functions. |
|
|
Term
Distributed Denial-of-Service (DDoS) |
|
Definition
an attack in which a coordinated stream of requests is launched against a target from many locations at the same time |
|
|
Term
|
Definition
a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is comng from a trusted host. |
|
|
Term
|
Definition
TCPhijacking attack, an attacker sniffs packets from the network, modifies them, and inserts them back into the network |
|
|
Term
|
Definition
unsolicited commercial e-mail. while many consider it a nuisance rather than an attack, it is emerging as a vector for some attacks |
|
|
Term
|
Definition
another form of email attack that is also a DoS, in which an attacker routes large quantities of email to the target. |
|
|
Term
|
Definition
a program and/or device that can monitor data travelling over a network. They can be used both for legitimate network management funcitons and for stealing information form a network |
|
|
Term
|
Definition
an attempt to gain personal or financial information from and individual, usually by posing as a legitimate entity |
|
|
Term
|
Definition
the redirection of legitimate web traffic to an illegitimate site for the purpose of obtaining private information |
|
|
Term
|
Definition
with the context of information security, the process of using social skills to convince people to reveal credentials or other valuableinformation to the hacker |
|
|
Term
|
Definition
works by exploring the contents of a web browser's cache. This could allow the designer to collect information to access to passwork-protected sites. another attack by the same name involves attempting to intercept cryptographic elements to determine keys and encryption algorithms. |
|
|
Term
Secure Software Assurance (SwA) Common Body of Knowledge (CBK) |
|
Definition
serves a strongly recommended guide to developing more secure applications. |
|
|
Term
1)Protects organizations's ability to function 2)Enables safe operations of applications implemented on organization's IT systems 3) Protects date the organization collects and uses 4) Safeguards the technology assets in use at the organization |
|
Definition
Information security performs four important functions: |
|
|
Term
|
Definition
object, person, or other entity representing a constant danger to an asset |
|
|
Term
Policy, education, training, and technology controls |
|
Definition
management effectively protects its information through: |
|
|
Term
|
Definition
a deliberate act that exploits vulnerability |
|
|
Term
|
Definition
secure systems require ____ ____. |
|
|