Term
|
Definition
Any device or process that is used to reduce risk. |
|
|
Term
|
Definition
Level of security controls. The processes for developing and ensuring policies and procedures are carried out. Decide what users may do, must do, or cannot do. |
|
|
Term
|
Definition
Level of security controls. Controls that are carried out or managed by devices. |
|
|
Term
|
Definition
General use term for subtypes of security controls. |
|
|
Term
|
Definition
Activity phase control. Control subtype that attempts to discourage security violations before they occur. |
|
|
Term
|
Definition
Activity phase control. Control subtype that works to prevent a threat from contacting a vulnerability. |
|
|
Term
|
Definition
Activity phase control. Control subtype designed to identify threats that have reached the system. |
|
|
Term
|
Definition
Activity phase control. Control subtype that provides an alternative to normal controls that cannot be used. |
|
|
Term
|
Definition
Activity phase control. Control subtype that is intended to mitigate damage caused by a security incident that has already occurred. |
|
|
Term
External Perimeter Defenses |
|
Definition
Physical security defenses designed to restrict access to the areas where equipment is located. Consists of defensive measures used to prevent entering or climbing over barriers around a restricted area, or to detect unauthorized persons within a restricted area. |
|
|
Term
|
Definition
Physical security defense designed to block or direct the passage of traffic. Generally this method can be circumvented by climbing over it. |
|
|
Term
CCTV (Closed Circuit Television) |
|
Definition
Physical security defense that consists of a network of video surveillance equipment that uses video cameras to transmit a signal to a specific set of receivers. |
|
|
Term
|
Definition
Physical security defense used to determine an object's change in position in relation to its surroundings. |
|
|
Term
|
Definition
Intelligent combination lock that uses buttons that must be pressed in the proper sequence in order to open the door. The combination can be programmed to change at specified times or as necessary. |
|
|
Term
|
Definition
A physical object used to identify a user in order to gain access to a restricted area. An ID badge is the most common type. |
|
|
Term
|
Definition
Device that detects a signal emitted from a physical token within a certain range. |
|
|
Term
RFID (Radio Frequency Identification) |
|
Definition
Tag affixed to a physical token that can be read by a scanner or proximity reader via radio waves. |
|
|
Term
|
Definition
Record of individuals who have permission to enter a secure area. |
|
|
Term
|
Definition
Device designed to separate a nonsecured area from a secured area. It consists of device monitors and controls two interlocking doors to a vestibule (small room) that only allows one door to be opened at a time. |
|
|
Term
PDS (Protected Distribution System) |
|
Definition
A system of cable conduits (hollow tubes that carry network cables) used to protect classified information that is transmitted between two secure areas. |
|
|
Term
|
Definition
Physical security that involves protecting the hardware of the host system. |
|
|
Term
|
Definition
Lock inserted into the security slot of a portable device used to secure the device to furniture with a steel cable. |
|
|
Term
|
Definition
Locked box used to secure a portable device such as a laptop. May contain other functions such as a charging station. |
|
|
Term
|
Definition
Document that clearly defines the defense mechanisms an organization will employ in order to keep information secure. |
|
|
Term
|
Definition
Standard against which systems can be evaluated and audited for their security posture. This is often done via a specialized software for this purpose. |
|
|
Term
|
Definition
The level of security that a system has. |
|
|
Term
|
Definition
A collection of security configuration settings. |
|
|
Term
- Protect the physical device - Secure the OS - Use antimalware software |
|
Definition
Three steps to secure the host? |
|
|
Term
- Develop security policy - Perform baselining - Configure OS security settings - Deploy & manage security settings - Patch management |
|
Definition
Five steps to enhance the security of an OS? |
|
|
Term
|
Definition
Universal, publicly released software security update that is intended to repair a known vulnerability. |
|
|
Term
|
Definition
Software update that addresses a security issue specific to certain customers. |
|
|
Term
|
Definition
Cumulative software update package consisting of patches, hotfixes, and other features. |
|
|
Term
|
Definition
The implementation of security measures into the design and coding of an OS. |
|
|
Term
|
Definition
An OS that has been designed with the implementation of OS hardening. |
|
|
Term
|
Definition
Antivirus software scanning method used to match known virus patterns against potentially infected files. |
|
|
Term
Dynamic Heuristic Detection |
|
Definition
Antivirus software scanning method that uses a variety of techniques to detect general characteristics of viruses, rather than attempting to make a match against known specific viruses. |
|
|
Term
|
Definition
Antispam filtering technique that detects spam by analyzing all words in email messages, and marks emails as spam that have a high amount of words that are most likely to be seen in a spam email. |
|
|
Term
|
Definition
Also known as a firewall, or software that is designed to prevent malicious network packets from entering a system by blocking network ports or applications. |
|
|
Term
|
Definition
Computer systems with a minimal OS and specific, dedicated function such as printers or ATMs. |
|
|
Term
|
Definition
Large computer system with significant processing capabilities. |
|
|
Term
SCADA (Supervisory Control And Data Acquisition) |
|
Definition
Large scale industrial control systems used in environments such as military, manufacturing, and power plants. |
|
|
Term
|
Definition
Software testing technique used to deliberately provide invalid, unexpected, or random data in order to detect errors. |
|
|
Term
XSRF (Cross-Site Request Forgery) |
|
Definition
Attack that uses a user's web browser settings to impersonate the user. |
|
|
Term
DLP (Data Loss Prevention) |
|
Definition
A system of security tools used to recognize and identify critical data. It monitors who is using the data and how it is being accessed in order to protect the data from unauthorized users. |
|
|
Term
|
Definition
Data actions being performed by endpoint devices (ex. creating/accessing an offline document) |
|
|
Term
|
Definition
Data actions that are transmitted across a network (ex. sending an email) |
|
|
Term
|
Definition
Data that is stored on electronic media. |
|
|
Term
|
Definition
Transforming information into a secure form so that unauthorized persons cannot access it. |
|
|
Term
|
Definition
Hiding the existence of data within a different data type. |
|
|
Term
|
Definition
Data that is used to describe the content or structure of a file. |
|
|
Term
|
Definition
The process of converting plaintext into ciphertext. |
|
|
Term
|
Definition
The process of converting ciphertext into plaintext. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Cleartext data that is to be encrypted, or that has resulted from being decrypted. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Procedures based on a mathematical formula that encrypt and decrypt data. |
|
|
Term
- Confidentiality (ensuring only authorized parties view it) - Integrity (ensuring the data is correct and has not been altered) - Availability (ensuring that authorized users are able to access the data) - Authentication (verifying the identity of a user) - Non-repudiation (verifying whether an authorized user, rather than an imposter, performed a specific action) |
|
Definition
The five basic protections of cryptography? |
|
|
Term
|
Definition
The process of verifying whether a user performed an action. |
|
|
Term
Stream Cipher or Substitution Cipher |
|
Definition
A cipher that replaces one character with one or more different characters. |
|
|
Term
|
Definition
A cipher that manipulates an entire block of plaintext at once. |
|
|
Term
|
Definition
A cipher that changes a string of any length into a different string of any length. |
|
|
Term
|
Definition
A one-way algorithm that creates a unique digital fingerprint for a set of data/The process of creating that fingerprint. |
|
|
Term
|
Definition
A unique digital fingerprint of a set of data that was created from the process of hashing. |
|
|
Term
|
Definition
An algorithm that cannot be reversed. |
|
|
Term
Hashed Message Authentication Code |
|
Definition
A hash function that uses a shared secret key, sent along with a message, that is unique to the sender. |
|
|
Term
|
Definition
The most recent message digest version. It produces a message padded to 512 bits that is expressed as a 32-bit hexadecimal number. |
|
|
Term
SHA (Secure Hash Algorithm) |
|
Definition
A very secure hash with four versions. It consists of a 160-bit digest and a 40 digit hexadecimal number, and uses a sponge function. |
|
|
Term
|
Definition
A newer, unpatented cipher consisting of a 512-bit digest. |
|
|
Term
RIPEMD (Research and Development in Advanced Communications Technologies Integrity Primitives Evaluation Message Digest) |
|
Definition
Message digest consisting of two parallel chains of computation that combine their result at the end. It has different versions that vary in length. |
|
|
Term
Symmetric Cryptographic Algorithms or Private Key Cryptography |
|
Definition
Algorithms that use the same key to encrypt and decrypt data. |
|
|
Term
DES (Data Encryption Standard) |
|
Definition
An older symmetric cryptography algorithm that uses a block cipher with a 56-bit key size. This original standard is no longer considered secure and newer, slightly more secure versions exist. |
|
|
Term
AES (Advanced Encryption Standard) |
|
Definition
A symmetric cryptography algorithm that uses a block cipher with a key size of either 128, 192, or 256 bits depending on the version. It is considered very secure as there have been no successful attacks against it. |
|
|
Term
|
Definition
A block cipher algorithm that runs effectively on 32-bit computers/A more secure version of this algorithm, which can have a key length from 32 to 448 bits |
|
|
Term
|
Definition
The only known cryptography method that cannot be broken mathematically. It consists of a sequence of random letters (a pad) that is used as a random key and combined with plaintext. It does not require the use of a computer and is intended to be destroyed after use. |
|
|
Term
Asymmetric Cryptographic Algorithms or Public Key Cryptography |
|
Definition
Cryptography method that uses two mathematically related keys: a public key, and a private key. |
|
|
Term
|
Definition
An electronic verification of the sender. |
|
|
Term
RSA (Rivest-Shamir-Adleman) |
|
Definition
The most common asymmetric cryptography algorithm, which is based around prime numbers. |
|
|
Term
ECC (Ecliptic Curve Cryptography) |
|
Definition
An asymmetric cryptography algorithm method which is based around sloping curves. |
|
|
Term
|
Definition
A lattice-based asymmetric cryptographic algorithm. |
|
|
Term
|
Definition
A cryptography method that exploits the properties of microscopic objects. |
|
|
Term
|
Definition
The process of sending and receiving public or private keys. |
|
|
Term
|
Definition
A key exchange method that takes place outside of normal communication channels. |
|
|
Term
|
Definition
A key exchange method that takes place within normal communication channels. These methods include: DH, DHE, ECDH, and Perfect Forward Secrecy. |
|
|
Term
|
Definition
An in-band key exchange method which generates random public keys which are different for each session and thus cannot reveal the contents of more than one message. |
|
|
Term
PGP (Pretty Good Privacy) |
|
Definition
A common cryptography system for files on Windows systems. |
|
|
Term
|
Definition
A common open-source cryptography system for files on Windows, Linux, and UNIX systems. |
|
|
Term
|
Definition
Cryptography method that applies to an entire hard disk, such as Bitlocker. |
|
|
Term
TPM (Trusted Platform Module) |
|
Definition
Cryptographic services provided via a dedicated chip on the motherboard. |
|
|
Term
HSM (Hardware Security Module) |
|
Definition
A physical hardware device that provides cryptographic services and is often a LAN based appliance intended to provide these services to multiple devices. |
|
|