Term
|
Definition
Weaknesses in your computer network design and individual host configuration. |
|
|
Term
|
Definition
The possibility of a malicious attack or other threat causing damage or downtime to a computer system. |
|
|
Term
|
Definition
The identification, assessment, and prioritization of risks, and the mitigating and monitoring of those risks. |
|
|
Term
|
Definition
Information Assurance
The practice of managing risks that are related to computer hardware and software systems. |
|
|
Term
|
Definition
The risk that is left over after a security and disaster recovery plan have been implemented. |
|
|
Term
|
Definition
The attempt to determine the amount of threats or hazards that could possibly occur in a given amount of time to your computers and networks. |
|
|
Term
Qualitative Risk Assessment |
|
Definition
An assessment that assigns numeric values to the probability of a risk and the impact it can have on the system or network. |
|
|
Term
Quantitative Risk Assessment |
|
Definition
An assessment that measures risk by using exact monetary values. |
|
|
Term
|
Definition
When a risk is reduced or eliminated altogether. |
|
|
Term
|
Definition
The transfer or outsourcing of risk to a third party. Also known as risk sharing. |
|
|
Term
|
Definition
When an organization avoids risk because the risk factor is too great. |
|
|
Term
|
Definition
When an organization mitigates risk to an acceptable level. |
|
|
Term
|
Definition
The amount of risk an organization is willing to accept. Also known as risk retention. |
|
|
Term
|
Definition
The practice of finding and mitigating software vulnerabilities in computers and networks. |
|
|
Term
|
Definition
Baselining of the network to assess the current security state of computers, servers, network devices, and the entire network in general. |
|
|
Term
|
Definition
A method of evaluating the security of a system by simulating one or more attacks on that system. |
|
|
Term
|
Definition
Open Vulnerability and Assessment Language
A standard and a programming language designed to standardize the transfer of secure public information across networks and the Internet utilizing any security tools and services available. |
|
|
Term
|
Definition
The study of physical and logical connectivity of networks. |
|
|
Term
|
Definition
The act of scanning for weaknesses and susceptibilities in the network and on individual systems. |
|
|
Term
|
Definition
Software used to decipher which ports are open on a host. |
|
|
Term
|
Definition
Software tool used to capture and analyze packets. |
|
|
Term
|
Definition
Software tool used to recover passwords from hosts or to discover weak passwords. |
|
|
Term
|
Definition
A password attack that uses a prearranged list of likely words, trying each of them one at a time. |
|
|
Term
|
Definition
A password attack where every possible password is attempted. |
|
|
Term
|
Definition
A password attack uses a considerable set of precalculated encrypted passwords located in a lookup table. |
|
|
Term
|
Definition
In password cracking, a set of precalculated encrypted passwords located in a lookup table. |
|
|
Term
|
Definition
The randomization of the hashing process to defend against cryptanalysis password attacks and Rainbow Tables. |
|
|