Term
|
Definition
A symmetric encryption algorithm that encrypts data by processing each block of data three times, using a different DES key each time. |
|
|
Term
|
Definition
A family of protocols developed by the IEEE for wireless LAN communication between wireless devices or between wireless devices and a base station. |
|
|
Term
|
Definition
A fast, secure, but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency. |
|
|
Term
|
Definition
A wireless communication protocol that improves upon 802.1ln by adding wider channels to increase throughput. |
|
|
Term
|
Definition
The first specification to be called Wi-Fi,is the least expensive wireless network protocol used to transfer data among computers with wireless network cards, or between a wireless computer or device and a wired LAN. The 802.11 b protocol provides for an 11 Mbps transfer rate in the 2.4 GHz frequency. |
|
|
Term
|
Definition
A specification for wireless data throughput at the rate of up to 54 Mbps in the 2.4 GHz band that is a potential replacement for 802.11b. |
|
|
Term
|
Definition
A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a |
|
|
Term
|
Definition
A standard for encapsulating EAP communications over a LAN or wireless LAN and that provides port-based authentication. |
|
|
Term
|
Definition
A security concept where a centralized platform verifies object identification, ensures the object is assigned relevant permissions, and then logs these actions to create an audit trail. |
|
|
Term
|
Definition
An analysis of events that can provide insight into how to improve response processes in the future. |
|
|
Term
|
Definition
An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted. |
|
|
Term
|
Definition
The process of determining and assigning privileges to resources, objects, and data. |
|
|
Term
|
Definition
A security control where user access privileges are audited to ensure they are accurate and adhere to relevant standards and regulations. |
|
|
Term
|
Definition
A common term used to refer to the processes, functions, and policies used to effectively manage user accounts within an organization. |
|
|
Term
|
Definition
A document that includes an organization's requirements for account creation, monitoring, and removal. |
|
|
Term
|
Definition
The process of determining who to hold responsible for a particular activity or event. |
|
|
Term
|
Definition
The process of tracking and recording system activities and resource access. |
|
|
Term
|
Definition
On a router, a list that is used to filter network traffic and implement anti-spoofing measures. In a DAC access control scheme, a list that is associated with each object, specifying the subjects that can access the object and their levels of access. |
|
|
Term
|
Definition
the standards-based directory service from Microsoft that runs on Microsoft Windows servers. |
|
|
Term
|
Definition
A redundancy mode used by load balancers to router traffic through primary (active) Load balancer is on standby in case of failure of the active device |
|
|
Term
|
Definition
A redundancy mode used by load balancers to route traffic equally through two load balancers. balancers to route traffic through a primary (active) load balancer while the other (passive) load balancer is on standby in case of failure of the active Device |
|
|
Term
adaptive chosen ciphertext attack |
|
Definition
A cryptographic attack where the attacker repeatedly encrypts a selected cipher text message and tries to find the matching plain text. Each subsequent attack is based on the results of the previous attack. |
|
|
Term
adaptive chosen plaintext attack |
|
Definition
A cryptographic attack where the attacker repeatedly encrypts a selected plain text message and analyzes the resulting cipher-text to crack the cipher. Each subsequent attack is based on the results of the previous attack. |
|
|
Term
|
Definition
Software that automatically displays or downloads advertisements when it is used. |
|
|
Term
|
Definition
A symmetric 128-, 192-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES. |
|
|
Term
|
Definition
A scheduling approach used by load balancers to route traffic to devices that have already established connections with the client in question |
|
|
Term
|
Definition
A network device that combines multiple ports into a single link in order enhance redundancy and increase bandwidth. |
|
|
Term
|
Definition
A software development model that focuses on iterative and incremental development to account for evolving requirements and expectations |
|
|
Term
|
Definition
An IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks. |
|
|
Term
|
Definition
A type of network isolation that physically separates a network from all other networks. |
|
|
Term
|
Definition
The total cost of a risk to an organization on an annual basis. |
|
|
Term
|
Definition
A network-based attack where the attacker dramatically increases the bandwidth sent to a victim during a DDoS attack by implementing an amplification factor |
|
|
Term
|
Definition
A network monitoring system that uses a baseline of acceptable outcomes or event patterns to identify events that fall outside the acceptable range. |
|
|
Term
|
Definition
A proprietary wireless network technology that is similar to Bluetooth implementations that consume a smaller amount of energy. |
|
|
Term
|
Definition
A category of software programs that scan a computer or network for known viruses, Trojans, worms, and other malicious software. |
|
|
Term
|
Definition
A program that will detect specific words that are commonly used in spam messages |
|
|
Term
|
Definition
Software that is specifically designed to protect systems against spyware attacks |
|
|
Term
|
Definition
An application that scans files for executable code that matches specific patterns that are known to be common to viruses. |
|
|
Term
|
Definition
The practice of preventing undesirable programs from running on a computer, computer network, or mobile device |
|
|
Term
application container/Applicatio Cell |
|
Definition
A virtualization method where applications run in isolated containers on the host operating system instead of in separate VM's |
|
|
Term
|
Definition
The practice of allowing approved programs to run on a computer, computer network, or mobile device |
|
|
Term
|
Definition
A threat that uses multiple attack vectors to gain unauthorized access to sensitive resources and then maintain that access for a long period of time. |
|
|
Term
|
Definition
A virus that can conceal its location or otherwise render itself harder to detect by anti-malware programs. |
|
|
Term
|
Definition
How many times per year a particular loss is expected to occur. |
|
|
Term
|
Definition
(Address Resolution Protocol) The mechanism by which individual hardware MAC addresses are matched to an IP address on a network. |
|
|
Term
|
Definition
A network-based attack where an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient. |
|
|
Term
|
Definition
A network-based attack where an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient |
|
|
Term
|
Definition
The process of taking inventory of and tracking all of an organization's objects of value. |
|
|
Term
|
Definition
A two-way encryption scheme that uses paired private and public keys. |
|
|
Term
|
Definition
Any technique used to exploit a vulnerability in an application or physical computer system without the authorization to do so. |
|
|
Term
|
Definition
The portion of a system or application that is exposed and available to attackers. |
|
|
Term
|
Definition
A term for users who gain unauthorized access or cause damage to computers and networks for malicious purposes. |
|
|
Term
|
Definition
The portion of accounting that entails security professionals examining logs of what was recorded. |
|
|
Term
|
Definition
A policy that defines the rules for user behavior with regard to using organizational resources. |
|
|
Term
|
Definition
A method of validating a particular entity's or individual's unique credentials. |
|
|
Term
|
Definition
The process of determining what rights and privileges a particular entity has. |
|
|
Term
|
Definition
The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need. |
|
|
Term
|
Definition
A mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication. |
|
|
Term
|
Definition
A type of attack where the attacker creates a software application or bogus user account to gain access to a system and its resources. |
|
|
Term
|
Definition
A documented plan that includes specific procedures and processes that are applied in the event that a change or modification made to a system must be undone |
|
|
Term
|
Definition
The act of collecting information about network hosts by examining text-based welcome screens that are displayed by some hosts. |
|
|
Term
|
Definition
A collection of security and configuration settings that are to be applied to a particular system or network in the organization. |
|
|
Term
|
Definition
A policy that describes and ratifies the organization's overall business continuity strategy. |
|
|
Term
|
Definition
A key-derivation function based on the Blowfish cipher algorithm. |
|
|
Term
behavior-based monitoring |
|
Definition
A network monitoring system that detects changes in normal operating data sequences and identifies abnormal sequences. |
|
|
Term
|
Definition
A systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations. |
|
|
Term
|
Definition
Authentication schemes based on individuals' physical characteristics. |
|
|
Term
|
Definition
A firmware interface that initializes hardware for an operating system boot. |
|
|
Term
|
Definition
A type of password attack that exploits weaknesses in the mathematical algorithms used to encrypt passwords, in order to take advantage of the probability of different password inputs producing the same encrypted output. |
|
|
Term
|
Definition
A decentralized, encrypted electronic payment system that is used by legitimate entities and threat actors alike. |
|
|
Term
|
Definition
A penetration test where the tester is given no information about the system being tested. |
|
|
Term
|
Definition
A hacker who exposes vulnerabilities without organizational consent, for financial gain or for some malicious purpose. |
|
|
Term
|
Definition
The practice of preventing undesirable programs from running on a computer, computer network, or mobile device |
|
|
Term
|
Definition
A type of symmetric encryption that encrypts data one block at a time, often in 64-bit blocks. It is usually more secure, but is also slower, than stream ciphers. |
|
|
Term
|
Definition
A freely available 64-bit block cipher algorithm that uses a variable key length. |
|
|
Term
|
Definition
A wireless attack where an attacker sends unwanted Bluetooth signals from a smartphone, mobile phone, tablet, or laptop to other Bluetooth-enabled devices. |
|
|
Term
|
Definition
A wireless attack where an attacker gains access to unauthorized information on a wireless device by using a Bluetooth connection. |
|
|
Term
|
Definition
A short-range wireless radio network transmission medium normally used to connect two personal devices, such as a mobile phone and a wireless headset |
|
|
Term
|
Definition
A set of computers that has been infected by a control program called a bot that enables attackers to exploit the computers to mount attacks. |
|
|
Term
|
Definition
A business agreement that defines how a partnership between organizations will be conducted, and what is expected of each organization. |
|
|
Term
|
Definition
A type of hijacking attack where the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity. Sometimes referred to as brandjacking |
|
|
Term
|
Definition
A device similar to a switch that has one port for incoming traffic and one port for outgoing traffic. |
|
|
Term
|
Definition
A type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords. |
|
|
Term
|
Definition
An application attack that exploits fixed data buffer sizes in a target piece of software by sending data that is too large for the buffer. |
|
|
Term
|
Definition
A collection of processes that enable an organization to maintain normal business operations in the face of some adverse event. |
|
|
Term
|
Definition
A mobile deployment model that describes how employees can use their own personal mobile devices to get work done, if they so choose. |
|
|
Term
|
Definition
A server that can issue digital certificates and the associated public/ private key pairs. |
|
|
Term
|
Definition
A single CA or group of CAs that work together to issue digital certificates. |
|
|
Term
|
Definition
A smart card that provides certificate-based authentication and supports two-factor authentication |
|
|
Term
|
Definition
A web page that a client is automatically directed to when connecting to a network, usually through public WI-FI. |
|
|
Term
|
Definition
A service offered by some SECaaS vendors to establish security gateways sitting between the organization's onĀ premises network and the cloud network, ensuring that traffic both ways complies with policy. |
|
|
Term
|
Definition
An encryption mode of operation where an exclusive or (XOR) is applied to the first plain text block. |
|
|
Term
|
Definition
A set of standards developed by a group of governments working together to create a baseline of security assurance for a trusted operating system (TOS). |
|
|
Term
|
Definition
An AES cipher-based encryption protocol used in WPA2. |
|
|
Term
|
Definition
The use of surveillance cameras that do not openly broadcast signals. |
|
|
Term
|
Definition
A connection method that enables mobile devices to connect to wireless transceivers in fixed locations all over the world. |
|
|
Term
|
Definition
A metric for bio metric devices that describes the threshold values of the FAR and FRR. A low CER signifies a highly accurate biometric system. |
|
|
Term
|
Definition
A linked path of verification and validation to ensure the validity of a digital certificate's issuer |
|
|
Term
|
Definition
A method of trusting digital certificates that bypasses the CA hierarchy and chain of trust to minimize man-in-the-middle attacks. |
|
|
Term
|
Definition
An encryption mode of operation where an initialization vector (IV) is encrypted before its result is XORed with the previous plain text block. |
|
|
Term
|
Definition
The record of evidence history from collection, to presentation in court, to disposal. |
|
|
Term
|
Definition
A linked path of verification and validation to ensure the validity of a digital certificate' issuer. |
|
|
Term
|
Definition
The process of approving and executing change in order to assure maximum security, stability, and availability of IT services. |
|
|
Term
|
Definition
An encrypted remote access authentication method that enables connections from any authentication method requested by the server, except for PAP and SPAP un-encrypted authentication. |
|
|
Term
|
Definition
The state of a virtual machine at a specific point in time. |
|
|
Term
|
Definition
A cryptographic attack where the attacker analyzes a selected cipher text message and tries to find the matching plain text. |
|
|
Term
|
Definition
A cryptographic attack where the attacker encrypts a selected plain text message and analyzes the resulting cipher text to crack the cipher. |
|
|
Term
|
Definition
The three basic principles of security control and management: confidentiality, integrity, & availability. Also known as the information security triad or triple. |
|
|
Term
|
Definition
An algorithm used to encrypt or decrypt data. |
|
|
Term
|
Definition
A collection of symmetric and asymmetric encryption algorithms commonly used in SSL/TLS connections. |
|
|
Term
|
Definition
Data that has been encoded and is unreadable |
|
|
Term
|
Definition
A cryptographic attack where the attacker has access to the cipher text and tries to use frequency analysis or other methods to break the cipher |
|
|
Term
|
Definition
Unencrypted, readable data that is not meant to be encrypted |
|
|
Term
|
Definition
A type of hijacking attack that forces a user to unintentionally click a link that is embedded in or hidden by other web page elements |
|
|
Term
|
Definition
A software attack that exploits the trust relationship between a client and the server it connects t |
|
|
Term
|
Definition
A method of computing that involves real-time communication over large distributed networks to provide the resources, software, data, & media needs of a user, business, or organization |
|
|
Term
|
Definition
A framework for IT management and governance created by ISACA |
|
|
Term
|
Definition
An evaluation used to identify potential weaknesses in an application |
|
|
Term
|
Definition
A form of digital signature that guarantees that source code and application binaries are authentic and have not been tampered wit |
|
|
Term
|
Definition
A predetermined alternate location where a network can be rebuilt after a disaster |
|
|
Term
|
Definition
The act of two different plain text inputs producing the same exact cipher-text output |
|
|
Term
|
Definition
Code that is converted from high-level programming language source code into a lower level code that can then be directly executed by the system. |
|
|
Term
|
Definition
The practice of ensuring that the requirements of legislation, regulation s, industry codes and standards, and organizational standards are me |
|
|
Term
|
Definition
The practice of collecting and analyzing data from storage devices, computer systems, networks, and wireless communications and presenting the information as a form of evidence in the court of law |
|
|
Term
|
Definition
The fundamental security goal of keeping information and communications private and protected from unauthorized access |
|
|
Term
|
Definition
A cryptographic technique that makes the relationship between an encryption key and its cipher-text as complex and opaque as possible |
|
|
Term
Context Aware Authentication |
|
Definition
A mobile device feature that takes each individual situation into consideration when deciding whether or not to authenticate a user or authorize access to remote apps and data |
|
|
Term
|
Definition
The practice of Constantly scanning an environment for threats, vulnerabilities and other areas of risk |
|
|
Term
|
Definition
Countermeasures that avoid, mitigate, or counteract security risks due to threats and attacks |
|
|
Term
|
Definition
A piece of data-such as an authentication token that is sent by a website to a client and stored on the client's computer |
|
|
Term
|
Definition
An application attack where an attacker injects a meta tag in an HTTP header, making it possible to modify a cookie stored in a browser |
|
|
Term
|
Definition
|
|
Term
|
Definition
A mobile deployment model that allows the organization to choose which devices they want employees to work with, while still allowing the employee some freedom to use the device for personal activities |
|
|
Term
|
Definition
A security mechanism that helps mitigate the consequences of a threat or attack from adversely affecting the computer system |
|
|
Term
|
Definition
A user who breaks encryption codes, defeats software copy protections, or specializes in breaking into systems |
|
|
Term
|
Definition
An application that stores passwords in an encrypted database for easy retrieval by the appropriate user |
|
|
Term
|
Definition
A list of certificates that were revoked before their expiration date |
|
|
Term
|
Definition
A form of ransomware that uses encryption to render the victim's data inaccessible |
|
|
Term
|
Definition
A software attack that exploits weaknesses in cryptographic system elements such as code, ciphers, protocols, and key management systems |
|
|
Term
|
Definition
Any software or hardware solution that implements one or more cryptographic concepts, such as different encryption and decryption algorithm |
|
|
Term
|
Definition
A security countermeasure that mitigates the impact of a rainbow table attack by adding a random value to ('salting") each plain text input |
|
|
Term
|
Definition
The science of hiding information, most commonly by encoding and decoding a secret code used to send messages |
|
|
Term
|
Definition
A cryptographic module that implements Microsoft's CryptoAPI |
|
|
Term
|
Definition
A message sent to a certificate authority in which a resource applies for a certificate |
|
|
Term
|
Definition
A web application attack that takes advantage of the trust established between an authorized user of a website and the website itself |
|
|
Term
|
Definition
An encryption mode of operation where a numerical counter value is used to create a constantly changing IV |
|
|
Term
|
Definition
An encryption mode of operation where a numerical counter value is used to create a constantly changing IV |
|
|
Term
|
Definition
A mobile deployment model that allows employees to select a mobile device from a list of accepted devices to use for work purposes. |
|
|
Term
|
Definition
In DAC, access is controlled based on a user's identity. Objects are configured with a list of users who are allowed access to them. An administrator has the discretion to place the user on the list or not. If a user i-s on the list, the user is granted access; if the user is not on the list, access is denied |
|
|
Term
|
Definition
Security Measures implemented to prevent key assets from being damaged |
|
|
Term
|
Definition
Information that is primarily stored on specific media, rather than moving from one medium to another |
|
|
Term
|
Definition
The practice of thoroughly eliminating data from storage media so that it cannot be recovered. |
|
|
Term
|
Definition
The process by which an attacker takes data that is stored inside of a private network and moves it to an external network |
|
|
Term
|
Definition
Information that primarily moves from medium to medium, such as over a private network or the Internet |
|
|
Term
|
Definition
Information that is currently being created, deleted, read from, or written to |
|
|
Term
|
Definition
The process of maintaining the existence of and control over certain data in order to comply with business policies and/or applicable laws and regulations |
|
|
Term
|
Definition
The security controls and measures taken to keep an organization's data safe and accessible, and to prevent unauthorized access to it |
|
|
Term
|
Definition
The sociopolitical outlook of a nation concerning computing technology and information |
|
|
Term
|
Definition
A network-based attack where an attacker hijacks or manipulates multiple computers (through the use of zombies or drones) on disparate networks to carry out a DoS attack |
|
|
Term
|
Definition
The process of translating ciphertext to plaintext |
|
|
Term
|
Definition
A cryptographic technique that converts ciphertext back to plaintext |
|
|
Term
|
Definition
A technique for removing duplicate copies of repeated data. In SIEM, the removal of redundant information provided by several monitored systems |
|
|
Term
|
Definition
Those portions of the World Wide Web that are not indexed by standard search engines. |
|
|
Term
|
Definition
A more comprehensive approach to layered security that also includes non-technical defenses like user training and physical protection |
|
|
Term
|
Definition
A data disposal method that applies a strong magnetic force to a disk drive so that it loses its magnetic charge and is rendered inoperable. |
|
|
Term
|
Definition
A Windows feature that prevents malicious code in memory from executing |
|
|
Term
|
Definition
(Data Encryption Standard) A symmetric encryption algorithm that encrypts data in 64- bit blocks using a 56-bit key, with 8 bits used for parity |
|
|
Term
|
Definition
The act of determining if a user has tried to access unauthorized data, or scanning the data and networks for any traces left by an intruder in any attack against the system. |
|
|
Term
|
Definition
A security mechanism that helps to discover if a threat or vulnerability has entered into the computer system |
|
|
Term
|
Definition
A piece of hardware such as a. computer, server, printer, or smartphone |
|
|
Term
|
Definition
A combination of software development and systems operations, and refers to the practice of integrating one discipline with the other |
|
|
Term
|
Definition
A cryptographic protocol that provides for secure key exchange |
|
|
Term
|
Definition
A protocol used to automatically assign IP addressing information to IP network computers. |
|
|
Term
|
Definition
A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange by using ephemeral keys. |
|
|
Term
|
Definition
An authentication protocol that allows for a variety of connection types, such as wireless. |
|
|
Term
|
Definition
A type of password attack that compares encrypted passwords against a predetermined list of possible password values |
|
|
Term
|
Definition
A backup type in which all selected files that have changed since the last full bach-up are backed up |
|
|
Term
|
Definition
A cryptographic technique that makes ciphertext change drastically upon even the slightest changes in the plaintext input |
|
|
Term
|
Definition
An electronic document that associates credentials with a public key |
|
|
Term
|
Definition
A message digest that has been encrypted again with a user's private key |
|
|
Term
|
Definition
A network service that stores identity information about all the objects in a particular network, inchiding users, groups, servers, client computers, and printers |
|
|
Term
|
Definition
An application attack that allows access to commands, files, and directories that may or may not be connected to the web document root directory |
|
|
Term
|
Definition
A major component of business continuity that focuses on repairing, reconstructing, restoring, and replacing systems, personnel, and other |
|
|
Term
|
Definition
A software vulnerability that can occur when a Wmdows-based application attempts to force another mnning application to load a dynamicĀ link library (DLL) in memory that could cause the victini application to experience instability or leak sensitive information |
|
|
Term
|
Definition
A software solution that detects and prevents sensitive information in a system or network &om being stolen or otherwise falling into the wrong hands |
|
|
Term
|
Definition
A small section of a private network that is located behind one firewall or between two firewalls and made available for public access |
|
|
Term
|
Definition
The service that maps names to IP addresses on most TCP/IP networks, including the Internet |
|
|
Term
|
Definition
A hijacking attack where an attacker sets up a rogue DNS server This rogue DNS server responds to legitimate requests with IP addresses for malicious or non-existent websites |
|
|
Term
|
Definition
A network-based attack where an attacker exploits the traditionally open nature of the DNS system to redirect a domain name to an IP address of the attacker's choosing |
|
|
Term
|
Definition
A network-based attack where an attacker exploits the traditionally open nature of the DNS system to redirect a domain name to an IP address of the attacker's choosing |
|
|
Term
|
Definition
A security protocol that provides authentication of DNS data and upholds DNS data integrity |
|
|
Term
|
Definition
A type of hijacking attack where the attack.er steals a domain name by altering its registration information and then transferring the domain name to another entity. Sometimes referred to as brandjacking |
|
|
Term
|
Definition
A network-based attack where the attacker disables systems that provide network services by consuming a network link's available bandwidth, consuming a single system's available resources, or exploiting programming flaws in an application or operating system |
|
|
Term
|
Definition
A cryptographic attack where the attacker exploits the need for backward compatibility to force a computer system to abandon the use of encrypted messages in favor of plaintext messages |
|
|
Term
|
Definition
A software attack where the attacker rewrites or replaces the legitimate device driver or application programming interface (API) to enable malicious activity to be performed |
|
|
Term
|
Definition
A computer that has been infected with a bot and is being used by an attackr to mount an attack-also called a Zombie |
|
|
Term
|
Definition
A policy that describes and ratifies the organization's disaster recovery strategy\ |
|
|
Term
|
Definition
A public key encryption standard used for digital signatures that provides authentication and integrity verification for messages\ |
|
|
Term
|
Definition
A human-based attack where the goal is to reclaim important information by inspecting the contents of trash containers\ |
|
|
Term
|
Definition
A type of digital certificate that proves that some entity has control over a particular domain name. Considered to be weaker than EV\\ |
|
|
Term
|
Definition
A rating from 1 to 7 that states the level of secure features offered by an operating system as defined by the Common Criteria (CC) |
|
|
Term
|
Definition
A wireless authentication protocol that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication |
|
|
Term
|
Definition
An EAP method that is expected to address the shortcomings of LEAP. |
|
|
Term
|
Definition
An EAP method that requires a client-side certificate for authentication using SSL/TLS. |
|
|
Term
|
Definition
A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also known as a sniffing attack. |
|
|
Term
|
Definition
An encryption mode of operation where each plain-text block is encrypted with the same key |
|
|
Term
|
Definition
An asymmetric encryption technique that leverages the algebraic structures of elliptic curves over finite fields |
|
|
Term
|
Definition
A cryptographic protocol that is based on DiffieĀ Hellman and that provides for secure key exchange by using ephemeral keys and elliptic curve cryptography |
|
|
Term
|
Definition
A metric for bio metric devices that describes the threshold values of the FAR and FRR. A low CER signifies a highly accurate bio metric system |
|
|
Term
|
Definition
Microsoft Windows NTFS-based public key encryption |
|
|
Term
|
Definition
An improvement over IGRP that includes features that support VLSM and classfull and classless sub net masks |
|
|
Term
|
Definition
The property by which a computing environment can instantly react to both increasing and decreasing demands in workload |
|
|
Term
|
Definition
A computer hardware and software system that has a specific function within a larger system |
|
|
Term
|
Definition
A disruption of electrical current that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit |
|
|
Term
|
Definition
A short burst of electrical interference caused by an abrupt and rapid acceleration of charged particles, which can short-circuit and damage electronic components |
|
|
Term
|
Definition
The process of translating plain-text to cipher-text |
|
|
Term
|
Definition
A security technique that converts data from plain-text form into coded (or cipher-text) form so that only authorized parties with the necessary decryption information can decode and read the data |
|
|
Term
|
Definition
Software that incorporates anti-malware scanners into a larger suite of security controls |
|
|
Term
|
Definition
An IPSec protocol that provides authentication for the origin of transmitted data, integrity and protection against replay attacks, and encryption to support the confidentiality of transmitted data |
|
|
Term
|
Definition
Considered to be stronger than DV |
|
|
Term
|
Definition
A wireless access point that deceives users into believing that it is a legitimate network access point |
|
|
Term
|
Definition
A private network that provides some access to outside parties, particularly vendors, partners, and select customers |
|
|
Term
|
Definition
A technique that ensures a redundant component, device, or application can quickly and efficiently take over the functionality of an asset that has failed |
|
|
Term
|
Definition
Something that is identified by a scanner or other assessment tool as not being a vulnerability, when in fact it is |
|
|
Term
|
Definition
Something that is identified by a scanner or other assessment tool as being a vulnerability, when in fact it is not |
|
|
Term
|
Definition
A metric for bio metric devices that describes the percentage of unauthorized users who were incorrectly authenticated by a bio metric system |
|
|
Term
|
Definition
A wire mesh container that blocks external electromagnetic fields from entering into the container |
|
|
Term
|
Definition
The ability of a computing environment to withstand a foreseeable component failure and continue to provide an acceptable level of service |
|
|
Term
|
Definition
A storage technology that encrypts an entire storage drive at the hardware level |
|
|
Term
|
Definition
A software or hardware device that protects a system or network by blocking unwanted network traffic |
|
|
Term
|
Definition
The first experienced person or team to arrive at the scene of an incident |
|
|
Term
|
Definition
Locally Shared Object-Data Stored on a users computer after visiting a website that uses Adobe Flash Player-these can be used to track a users's activity |
|
|
Term
|
Definition
A security control in network switches that protects hosts on the switch against SYN flood and ping flood DoS attacks. |
|
|
Term
|
Definition
A DoS attack where the attacker sends spoofed UDP traffic to a router's broadcast address, intending for a large amount of UDP traffic to be .returned to the target computer |
|
|
Term
|
Definition
A cryptographic analysis technique where an attacker identifies repeated letters or groups of letters and compares them to how often they occur in plain-text, in an attempt to fully or partially reveal the plain-text message |
|
|
Term
|
Definition
A metric for bio metric devices that describes the percentage of authorized users who were incorrectly rejected by a bio metric system |
|
|
Term
|
Definition
A communications protocol that enables the transfer of files between a user's workstation and a remote host |
|
|
Term
|
Definition
A secure version of the File Transfer Protocol that uses a Secure Shell tunnel as an encryption method to transfer, access, and manage files |
|
|
Term
|
Definition
A protocol that combines the use of FTP with additional support for TLS and SSL |
|
|
Term
|
Definition
A protocol that combines the use of FTP with additional support for TLS and SSL |
|
|
Term
|
Definition
A backup type in which all selected files,regardless of prior state, are backed up |
|
|
Term
|
Definition
A type of port scan that completes the three way handshake, identifies open ports, and collects information about network hosts by banner grabbing |
|
|
Term
|
Definition
A dynamic code analysis technique that involves sending a running application random and unusual input so as to evaluate how the app responds |
|
|
Term
|
Definition
The reliable connection range and power of a wireless signal, measured in decibels |
|
|
Term
|
Definition
An encryption mode of operation that adds authentication to the standard encryption services of a cipher mode |
|
|
Term
|
Definition
The practice of creating a virtual boundary based on real-world geography |
|
|
Term
|
Definition
The process of identifying the real-world geographic location of an object, often by associating a location such as a street address with an IP address, hardware address, Wi-Fi positioning system, GPS coordinates, or some other form of information |
|
|
Term
|
Definition
The process of adding geographic location metadata to captured media such as pictures or videos |
|
|
Term
|
Definition
A free open-source version of PG P that provides the equivalent encryption and authentication services |
|
|
Term
|
Definition
A penetration test where the tester may have knowledge of internal architectures and systems, or other preliminary information about the system being tested |
|
|
Term
|
Definition
A hacker who exposes security flaws in applications and operating systems without consent, but not ostensibly for malicious purposes |
|
|
Term
|
Definition
Suggestions, recommendations, or best practices for how to meet a policy standard |
|
|
Term
|
Definition
Someone who excels at programming or managing and configucing computer systems, or has the skills to gain access to computer systems through unauthorized or unapproved means |
|
|
Term
|
Definition
A hacker who gains unauthorized access to and causes disruption in a computer system in an attempt to achieve political or social change |
|
|
Term
|
Definition
A security technique in which the default configuration of a system is altered to protect the system against attacks |
|
|
Term
|
Definition
An attack that targets a computer's physical components and peripherals, including its hard disk, motherboard, keyboard, network cabling, or smart card reader, and is designed to destroy hardware or acquire sensitive information stored on the hardware |
|
|
Term
|
Definition
The value that results from hashing encryption. Also known as hash value or message digest |
|
|
Term
|
Definition
The value that results from hashing encryption. Also known as hash value or message digest |
|
|
Term
|
Definition
A process or function that transforms plaintext into ciphertext that cannot be directly decrypted |
|
|
Term
|
Definition
A network monitoring system that uses known best practices and characteristics in order to identify and fix issues within the network |
|
|
Term
|
Definition
A type of IDS that monitors a computer system for unexpected behavior or drastic changes to the system's state |
|
|
Term
|
Definition
The property that defines how closely systems approach the goal of providing data availability 100 percent of tl1e time while maintaining a high level of system performance |
|
|
Term
|
Definition
A group of network-based attacks where an attacker gains control of the communication between two systems, often masquerading as one of the entities |
|
|
Term
|
Definition
A type of IPS that monitors a computer system for unexpected behavior or drastic changes to the system's state and reacts in real time to block it |
|
|
Term
|
Definition
A method used to verify both the integrity and authenticity of a message by combining cryptographic hash functions, such as MDS or SHA -1, with a secret key |
|
|
Term
|
Definition
An email-based, IM-based, or web-based attack that is intended to trick the user into performing unnecessary or undesired actions, such as deleting important system files in an attempt to remove a virus, or sending money or important information via email or online forms |
|
|
Term
|
Definition
An entire dummy network used to lure attackers |
|
|
Term
|
Definition
A security tool used to lure attackers away from the actual network components. Also called a decoy or sacrificial lamb |
|
|
Term
|
Definition
Software that is installed on a single system to specifically guard against networking attacks |
|
|
Term
|
Definition
A method used within data centers and computer rooms to control the temperature and humidity by directing the flow of hot and cold air |
|
|
Term
|
Definition
A fully configured alternate network that can be online quickly after a disaster |
|
|
Term
|
Definition
A patch that is often issued on an emergency basis to address a specific security flaw |
|
|
Term
|
Definition
An algorithm that generates a one-time passwo.rd using a hash-based authentication code to verify the authenticity of the message |
|
|
Term
|
Definition
A physical device that provides root of trust capabilities |
|
|
Term
|
Definition
A protocol that defines the interaction between a web server and a browser |
|
|
Term
|
Definition
A secure version of HTTP that provides a secure connection between a web browser and a server |
|
|
Term
|
Definition
A system that controls the air quality and flow inside a building |
|
|
Term
|
Definition
An attack that uses multiple attack methods, including dictionary, rainbow table, and brute force attacks when trying to crack a password |
|
|
Term
|
Definition
A layer of software that separates a VM's software from the physical hardware it mns on |
|
|
Term
|
Definition
A computing method that uses the cloud to provide any or all infrastructure needs |
|
|
Term
|
Definition
A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications |
|
|
Term
|
Definition
An IP network service that reports on connections between two hosts |
|
|
Term
|
Definition
A networked system that controls critical infrastructure such as water, electrical, transportation, and telecommunication services |
|
|
Term
|
Definition
The process of claiming some information about the nature of a paiticular entity |
|
|
Term
|
Definition
The practice of linking a single identity across multiple disparate identity management systems |
|
|
Term
|
Definition
A software and/or hardware system that scans, audits, and monitors the security infrastructure for signs of attacks in progress |
|
|
Term
|
Definition
A professional association of electrical and electronics engineers that develops industry standards for a variety of technologies |
|
|
Term
|
Definition
A distance-vector routing protocol developed by Cisco as an improvement over RIP and RIP v2. |
|
|
Term
|
Definition
A type of communication service which involves a private dialogue between two persons via instant text-based messages over the Internet |
|
|
Term
|
Definition
A protocol used to retrieve email messages and folders from a mail server |
|
|
Term
|
Definition
a version of the internet Message Access Protocol that uses SSL or TLS to provide secure communication between mail client and the mail server |
|
|
Term
|
Definition
a version of the internet Message Access Protocol that uses SSL or TLS to provide secure communication between mail client and the mail server |
|
|
Term
|
Definition
A system that is not upgraded in-place, but is progranunatically destroyed and then recreated from scratch every time the configuration changes |
|
|
Term
|
Definition
A type of social engineering in which an attacker pretends to be someone they are not, typically to pretend to be average user in distress, or a help desk representative |
|
|
Term
|
Definition
The principle that establishes that everything that is not explicitly allowed is denied |
|
|
Term
|
Definition
A description of the events that occurred during a security incident |
|
|
Term
|
Definition
The practice of using an organized methodology to address and manage security breaches and attacks while limiting danlige and reducing recovery costs |
|
|
Term
|
Definition
A backup type in which all selected files that have changed since the last full or incremental backup (whichever was most recent) are backed up |
|
|
Term
|
Definition
The protection of available information or information resources from unauthorized access, attack, theft, or data damage |
|
|
Term
information security triad |
|
Definition
The three basic principles of security control and management: confidentiality, integrity, and availability. Also known as the information security triad or triple triad |
|
|
Term
|
Definition
A form of wireless transmission in which signals are sent as pulses of infrared light |
|
|
Term
|
Definition
An information technology strategy that asserts that the organization's infrastructure can be quickly configured and deployed as desired through programming scripts and other code-files, rather than through standard software tools. |
|
|
Term
|
Definition
Limits what data a user can enter into specific fields, like not allowing special characters in a user name field |
|
|
Term
|
Definition
Present and past employees, contractors, partners, and any entity that has access to proprietary confidential information and whose actions result in compromised security |
|
|
Term
|
Definition
The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications |
|
|
Term
|
Definition
In wireless networking, the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals used by computing devices and other network devices |
|
|
Term
|
Definition
The collection of rules required for Internet connectivity |
|
|
Term
|
Definition
A private network that is only accessible by the organization's own personnel |
|
|
Term
|
Definition
(Internet of Things)(electronic or not) that are connected to the wider Internet by using embedded electronic components |
|
|
Term
|
Definition
An attack in which an attacker sends IP packets from a false (or spoofed) source address to communicate with targets |
|
|
Term
|
Definition
An inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it |
|
|
Term
|
Definition
A set of open, non-proprietary standards that are used to secure data through authentication and encryption as the data travels across the network or the Internet |
|
|
Term
|
Definition
(IP version 4) An Internet standard that uses a 32-bit number assigned to a computer on a TCP /IP network |
|
|
Term
|
Definition
(IP version 6) An Internet standard that increases the available pool of IP addresses by implementing a 128-bit binary address space. |
|
|
Term
|
Definition
A document or series of documents that describe procedures for detecting, responding to, and minimizing the effects of security incidents |
|
|
Term
|
Definition
A business agreement that focuses on ensuring security between organizations in a partnership |
|
|
Term
|
Definition
A standard model for information systems management practices created by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) |
|
|
Term
|
Definition
A component of the business continuity plan (BCP) that specifies alternate IT procedures to switch over to when the organization is faced with an attack m disruption of service leading to a disaster |
|
|
Term
|
Definition
A comprehensive IT management structure derived from recommendations originally developed by the United Kingdom Government's Central Computer and Telecommunications Agency (CCTA) |
|
|
Term
|
Definition
A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption |
|
|
Term
|
Definition
A wireless attack where the attacker is able to predict or control the IV of an encryption process, thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user or network |
|
|
Term
|
Definition
The process of removing software restrictions on an iOS device, allowing the user to run apps not downloaded from the official App Store |
|
|
Term
|
Definition
In wireless networking, the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals used by computing devices and other network devices |
|
|
Term
|
Definition
A concept that states that personnel -should rotate between job roles to prevent abuses of power, reduce boredom, and improve professional skills |
|
|
Term
|
Definition
An authentication service that is based on a time-sensitive ticket-granting system. It uses an SSO method where the user enters access credentials that a.re then passed to the authentication server, which contains the allowed access credentials |
|
|
Term
|
Definition
A specific piece of information that is used in conjunction with an algorithm to perform encryption and decryption |
|
|
Term
|
Definition
A method for backing up private keys to protect them while allowing trusted third parties to access the keys under certain conditions |
|
|
Term
|
Definition
A third party that maintains a backup copy of private keys |
|
|
Term
|
Definition
Any method by which cryptographic keys are transferred among users, thus enabling the use of a cryptographic algorithm |
|
|
Term
|
Definition
The asymmetric encryption process of producing a public and private key pair using a specific application |
|
|
Term
|
Definition
A technique that strengthens potentially weak cryptographic keys, such as passwords or passphrases created by people , against brute force attacks |
|
|
Term
|
Definition
A hardware device or software application that recognizes and records every keystroke made by a user |
|
|
Term
|
Definition
A type of authentication that relies on detailed information that describes exactly when a keyboard key is pressed and released as someone types information into a computer or other electronic device |
|
|
Term
|
Definition
A cryptographic attack where the attacker has access to plain-text and the corresponding cipher-text, and tries to derive the correlation between them |
|
|
Term
|
Definition
The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP, Frame Relay, or ATM |
|
|
Term
|
Definition
An approach to operational security that incorporates many different avenues of defense |
|
|
Term
|
Definition
A simple network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information |
|
|
Term
|
Definition
An application attack that targets web-based applications by fabricating LDAP statements that are typically created by user input |
|
|
Term
|
Definition
A method of implementing LDAP using SSL/TLS encryption |
|
|
Term
|
Definition
Cisco Systems' proprietary EAP implementation |
|
|
Term
|
Definition
The principle that establishes that users and software should have the minimal level of access that is necessary for them to perform the duties required of them |
|
|
Term
|
Definition
A process designed to preserve all relevant information when litigation is reasonably expected to occur |
|
|
Term
|
Definition
The process of booting into an operating system that runs directly on RAM rather than being installed on a storage device |
|
|
Term
|
Definition
(after-action report) An analysis of events that can provide insight into how to improve response processes in the future |
|
|
Term
|
Definition
A network device that distributes the network traffic or computing workload among multiple devices in a network |
|
|
Term
|
Definition
The act of recording data about activity on a computer |
|
|
Term
|
Definition
A piece of code that sits dormant on a target computer until it is triggered by the occurrence of specific conditions, such as a specific date and time |
|
|
Term
|
Definition
Security measures implemented to prevent key assets from being damaged |
|
|
Term
|
Definition
Data stored on a user's computer after visiting a website that uses Adobe Flash Player. These can be used to track a user's activity. |
|
|
Term
|
Definition
A mathematical control that takes into account the total number of key recovery agents (N) along with the number of agents required to perform a key recovery |
|
|
Term
|
Definition
A system in which objects (files and other resources) are assigned security labels of varying levels, depending on the object's sensitivity. Users are assigned a security level or clearance, and when they try to access an object, their clearance is compared to the object's security label. If there is a matcl1, the user can access the object; if there is no match, the user is denied access. |
|
|
Term
|
Definition
A unique physical address assigned to each network adapter board at the time of its manufacture |
|
|
Term
|
Definition
An attack in which an attacker falsifies the factory-assigned MAC address of a device's network interface |
|
|
Term
|
Definition
The security technique of allowing or denying specific mac addresses from connecting to a network device. |
|
|
Term
|
Definition
an entity hat is partially or wholly responsible for an incident that affects or has the potential to affect an organization's security |
|
|
Term
|
Definition
Undesired or unauthorized software that is placed into a target system to disrupt operations or to redirect system resources for the attacker's benefit |
|
|
Term
|
Definition
Malicious code, such as viruses, Trojans, or worms, which is designed to gain unauthorized access to, make unauthorized use of, or damage computer systems and networks |
|
|
Term
|
Definition
The practice of isolating malware in a viitual environment where it can be safely analyzed without compromising production systems or the rest of the network |
|
|
Term
man-in-the-browser attack |
|
Definition
A type of network-based attack that combines a man-in-the-middle attack with the use of a Trojan horse to intercept and modify web transactions in real time |
|
|
Term
|
Definition
A form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently |
|
|
Term
|
Definition
Procedures implemented to monitor the adllerence to organizational security policies |
|
|
Term
|
Definition
A concept that states that personnel should be required to go on vacation for a period of time so their activities can be reviewed |
|
|
Term
|
Definition
A physical security control system that has a door at each end of a secure chamber |
|
|
Term
|
Definition
A hash algorithm, based on RFC 1320, that produces a 128-bit hash value and is used in message integrity checks for data authentication |
|
|
Term
|
Definition
A hash algorithm, based on RFC 1321, that produces a 128-bit hash value and is used in IPSec policies for data authentication |
|
|
Term
|
Definition
The process of tracking, controlling, and securing an organization's mobile infrastructure |
|
|
Term
|
Definition
A method that connects devices to the network and carries data between devices. |
|
|
Term
|
Definition
A software vulnerability that can occur when software does not release allocated memory when it is done using it, potentially leading to system instability |
|
|
Term
|
Definition
The value that results from hashing encryption. Also known as hash value or message digest |
|
|
Term
|
Definition
An embedded systems component that consolidates the functionality of a CPU, memory module, and peripherals. Also known as system on chip (SoC) |
|
|
Term
|
Definition
An extension of SMTP that enables the exchange of audio, video, images, applications, and other data formats through email |
|
|
Term
|
Definition
The process of evaluating how well a software project meets the specifications that were defined earlier in development |
|
|
Term
|
Definition
A non-legally binding business agreement that defines a common goal that cooperating entities work toward without direct monetary compensation |
|
|
Term
|
Definition
A protocol that strengthens the password authentication provided by Protected Extensible Authentication Protocol (PEAP) |
|
|
Term
|
Definition
The rating on a device or component that predicts the expected time between failures |
|
|
Term
|
Definition
The longest period of time a business can be inoperable without causing irrevocable business failure |
|
|
Term
|
Definition
The average time a device or component is expected to be in operation |
|
|
Term
|
Definition
The average time taken for a device or component to be repaired, replaced, or otherwise recover from a failure |
|
|
Term
multi-factor authentication |
|
Definition
An authentication scheme that requires validation of at least two distinct authentication factors |
|
|
Term
|
Definition
A security mechanism that requires that each party in a communication verifies the identity of every other party in the communication |
|
|
Term
|
Definition
The collection of protocols, policies, and hardware that govern access of devices connecting to a network |
|
|
Term
|
Definition
A RADIUS server configuration that uses a centralized server and clients |
|
|
Term
|
Definition
A simple form of Internet security that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-mutable addresses internally |
|
|
Term
|
Definition
A contract that states that an individual will not share certain sensitive information to outside parties under penalty of law |
|
|
Term
|
Definition
A service that enables applications to properly communicate over different computers in a network |
|
|
Term
|
Definition
Hardware that translates the data between the network and a device |
|
|
Term
|
Definition
The general practice of keeping networks separate from one another |
|
|
Term
|
Definition
The process of multiple connected switches bouncing traffic back and forth for an indefinite period of time |
|
|
Term
|
Definition
A device or program that can identify the logical topology of a network to reveal its connection pathways |
|
|
Term
|
Definition
Software that controls network traffic and access to network resources |
|
|
Term
|
Definition
The division of a large network into smaller logical networks |
|
|
Term
|
Definition
The general practice of keeping networks separate from one another. |
|
|
Term
|
Definition
A security control on network devices that creates a copy of network traffic to forward to a sensor or monitor like an IDS |
|
|
Term
|
Definition
A hardware/ software combination that protects all the computers on a network behind the firewall |
|
|
Term
|
Definition
A device or program that can identify the logical topology of a network to reveal its connection pathways |
|
|
Term
|
Definition
A mobile device communication standard that operates at very short range, often through physical contact |
|
|
Term
|
Definition
A system that uses passive hardware sensors to monitor traffic on a specific segment of the network |
|
|
Term
|
Definition
An active, inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it |
|
|
Term
|
Definition
Publications by the National Institute of Standards and Technology (NIST) that focus on computer security standards |
|
|
Term
|
Definition
The property by which a computing environment is discarded once it has finished its assigned task |
|
|
Term
|
Definition
The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data |
|
|
Term
|
Definition
An arbitrary number used only once in a cryptographic communication, often to prevent replay attacks |
|
|
Term
|
Definition
A software development technique that tries to "repair" invalid input to strip any special encoding and automatically convert the input to a specific format that the application can handle |
|
|
Term
|
Definition
A challenge-response authentication protocol created by Microsoft for use in its products |
|
|
Term
|
Definition
An Internet protocol that enables synchronization of device clock times in a network of devices by exchanging time signals |
|
|
Term
|
Definition
A token-based authorization protocol that is often used in conjunction with OpenID |
|
|
Term
|
Definition
A technique that essentially "hides" or "camouflages" code or other information so that it is harder to read by unauthorized users |
|
|
Term
|
Definition
An HTTPĀ based alternative to a certificate revocation list that checks the status of certificates |
|
|
Term
|
Definition
A method of checking the status of digital certificates where a web server queries the OCSP server at specific .intervals, and the OCSP server responds by providing a timeĀ stamped digital signature. The web server appends this signed response to the SSL/TLS handshake with the client so that the client can verify the certificate's status |
|
|
Term
|
Definition
An encryption mode of operation where the result of the encrypted IV is fed back to the subsequent operation |
|
|
Term
offline brute force attack |
|
Definition
A cryptographic attack where the attacker steals the password, and then tries to decode it by systematically guessing possible keystroke combinations that match the encrypted password |
|
|
Term
|
Definition
A series of numbers, separated by periods, that describe the identity of the owner of a digital certificate |
|
|
Term
online brute force attack |
|
Definition
A Cryptographic attack where the attacker tries to enter a succession of passwords, using the same interface as the target user application |
|
|
Term
|
Definition
An identity federation method that enables users to be authenticated on cooperating websites by a third-party authentication service |
|
|
Term
|
Definition
An authentication layer that sits on top of the OAuth 2.0 authorization protocol |
|
|
Term
|
Definition
Security measures implemented to safeguard all aspects of day-to-day operations, functions, and activities |
|
|
Term
|
Definition
A concept that dictates what types of systems to prioritize in disaster recovery efforts |
|
|
Term
|
Definition
The order in which volatile data should be recovered from various storage locations and devices after a security incident occurs |
|
|
Term
|
Definition
A method of abstracting how different layers of a network structure interact with one another |
|
|
Term
|
Definition
Information that is legally collected from publicly available origins |
|
|
Term
|
Definition
A password that is generated for use in one specific session and becomes invalid after the session ends |
|
|
Term
|
Definition
A computing method that uses the cloud to provide any platform type services. |
|
|
Term
|
Definition
A device or program that monitors network communications on the network wire or across a wireless network and captures data |
|
|
Term
|
Definition
An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet |
|
|
Term
|
Definition
A -remote access authentication service that sends user IDs and passwords as clear text |
|
|
Term
|
Definition
A network-based attack where the attacker steals hashed user credentials and uses them asĀ is to try to authenticate to the same network the hashed credentials originated on |
|
|
Term
|
Definition
Any attack where the attacker tries to gain unauthorized access to and use of passwords |
|
|
Term
|
Definition
A small unit of supplemental code meant to address either a security problem or a functionality flaw in a software package or operating system |
|
|
Term
|
Definition
A key derivation function used in key stretching to make potentially weak cryptographic keys such as passwords less susceptible to brute force attacks |
|
|
Term
|
Definition
A encryption mode of operation in which each plain-text block is XORed with the previous plain-text and cipher-text blocks |
|
|
Term
|
Definition
Similar to EAP-TLS, PEAP is an open standard developed by a coalition made up of Cisco Systems, Microsoft, and RSA Security |
|
|
Term
|
Definition
A method of evaluating security by simulating an attack on a system |
|
|
Term
|
Definition
A penetration testing technique where the tester has concluded the initial exploitation, and is now interested in maintaining access to the network |
|
|
Term
Personal Identity Verification card |
|
Definition
A smart card that meets the standards for FIPS 201, in that it is resistant to tampering and provides quick electronic authentication of the card's owner |
|
|
Term
|
Definition
The practice of ensuring that all of an organization's personnel, whether internal or external, ace complying with policy |
|
|
Term
|
Definition
A characteristic of session encryption that ensures if a key used during a certain session is compromised, it should not affect data previously encrypted by that key |
|
|
Term
|
Definition
A method of securing emails created to prevent attackers from intercepting and manipulating email and attachments by encrypting and digitally signing the contents of the email using public key cryptography |
|
|
Term
|
Definition
An attack in which a request for a website, typically an e-commerce site, is redirected to a similar-looking, but fake, website |
|
|
Term
|
Definition
A type of email-based social engineering attack, in which the attacker sends email from a supposedly reputable source, such as a bank, to tty to elicit private information from the victim |
|
|
Term
|
Definition
A tool for identifying and analyzing risks to privacy during the development life cycle of a program or system |
|
|
Term
|
Definition
A human-based attack where an attacker enters a secure area by following a legitimate employee with the employee's knowledge or permission |
|
|
Term
|
Definition
The pieces of information that a company uses or prefers to use to identify or contact an employee or other individual |
|
|
Term
|
Definition
A smart card that meets the standards for FIPS 201, in that it is resistant to tampering and provides quick electronic authentication of the card's owner |
|
|
Term
|
Definition
A penetration testing technique where the tester compromises one central host (the pivot) that allows the tester to access other hosts that would otherwise be inaccessible |
|
|
Term
|
Definition
A system that is composed of a CA, certificates, software, services, and other cryptographic components, for the purpose of enabling authenticity and validation of data and/or entities |
|
|
Term
|
Definition
Un-Encrypted data that is meant to be encrypted before it is transmitted, or the result of decryption of encrypted data |
|
|
Term
|
Definition
A software vulnerability that can occur when the code attempts to remove the relationship between a pointer and the thing it points to (pointee). If the pointee is not properly established, the dereferencing process may crash the application and corrupt memory |
|
|
Term
|
Definition
Malicious code that is designed to avoid detection by altering its decryption module each time it infects a new file |
|
|
Term
|
Definition
A protocol used to retrieve email from a mailbox on the mail server |
|
|
Term
|
Definition
a version of the Post Office Protocol that uses SSL or TLS to provide secure communications |
|
|
Term
|
Definition
Software that prevents pop-ups from sites that are unknown or untrusted and prevents the transfer of unwanted code to the local system |
|
|
Term
|
Definition
a version of the Post Office Protocol that uses SSL over TLS to provide secure communications |
|
|
Term
|
Definition
An endpoint of a logical connection that host computers use to connect to processes or services on other hosts |
|
|
Term
|
Definition
A network-based attack where an attacker scans computers and other devices to see which ports are listening, in an attempt to find a way to gain unauthorized access |
|
|
Term
|
Definition
The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links |
|
|
Term
|
Definition
A VPN protocol that is an extension of the PPP remote access protocol |
|
|
Term
|
Definition
The security approach of blocking unauthorized access or attacks before they occur |
|
|
Term
|
Definition
A security mechanism that helps to prevent a threat or attack from exposing a vulnerability in the computer system |
|
|
Term
|
Definition
The component of asymmetric encryption that is kept secret by one party during two-way encryption |
|
|
Term
|
Definition
A root CA that is created by a company for use primarily within the company itself |
|
|
Term
|
Definition
The task of granting privileges to a user only when needed and revoking them as soon as the task is done |
|
|
Term
|
Definition
The practice of exploiting flaws in an operating system or other application to gain a greater level of access than was intended for the user or application |
|
|
Term
|
Definition
The use of authentication and authorization mechanisms to provide an administrator with centralized or decentralized control of user and group role-based privilege management |
|
|
Term
|
Definition
The process by which an algorithm produces numbers that approximate randomness without being truly random |
|
|
Term
|
Definition
Step-by-step instructions that detail how to implement components of a policy |
|
|
Term
|
Definition
A method of securing the physical cabling of a communications infrastructure |
|
|
Term
|
Definition
Software that controls network communications using a set of rules |
|
|
Term
|
Definition
This type of diagnostic software can examine and display data packets that are being transmitted over a network |
|
|
Term
|
Definition
A device that acts on behalf of one end of a network connection when communicating with the other end of the connection |
|
|
Term
|
Definition
A string of text that a VPN or other network service expects to receive prior to any other credentials. In the context of WPA/2-Personal, the key is generated from the wireless password |
|
|
Term
|
Definition
A document used to determine when a PIA is required |
|
|
Term
|
Definition
The component of asymmetric encryption that can be accessed by anyone |
|
|
Term
|
Definition
A root CA that is created by a vendor for general access by the public |
|
|
Term
|
Definition
An authority in a PKI that processes requests for digital certificates from users |
|
|
Term
|
Definition
A software vulnerability that can occur when the outcome from execution processes is directly dependent on the order and timing of certain events, and those events fail to execute in the order and timing intended by the developer |
|
|
Term
|
Definition
A standard protocol for providing centralized authentication and authorization services for remote users |
|
|
Term
|
Definition
A set of vendor-independent specifications that support redundancy and fault tolerance for configurations on multiple-device storage systems |
|
|
Term
|
Definition
A type of password attack where an attacker uses a set of related plaintext passwords and their hashes to crack passwords |
|
|
Term
|
Definition
Software that enables an attacker to take control of a user's system or data and to demand payment for return of that control |
|
|
Term
|
Definition
A specialized Trojan horse that specifically aims to provide an attacker with unauthorized access to or control of a target computer |
|
|
Term
|
Definition
A system in which access is controlled based on a user's role. Users are assigned to roles, and network objects are configured to allow access only to specific roles. Roles are created independently of user accounts |
|
|
Term
|
Definition
A series of variable key-length symmetric encryption algorithms developed by Ronald Rivest |
|
|
Term
|
Definition
A penetration testing technique where the tester tries to gather as much information as possible about the target(s) |
|
|
Term
|
Definition
The act of recovering vital data present in files or folders from a crashed system or data storage devices when data has been compromised or damaged |
|
|
Term
|
Definition
An individual with the necessary credentials to decrypt files that were encrypted by another user |
|
|
Term
|
Definition
The property by which a computing environment keeps one or more sets of additional resources in addition to the primary set of resources |
|
|
Term
|
Definition
The process of restructuring application code to improve its design without affecting the external behavior of the application, or to enable it to handle particular situations |
|
|
Term
|
Definition
An authentication process that enables a host to verify its hardware and software configuration to a remote host, such as a server |
|
|
Term
|
Definition
A security method of restricting access to sensitive data on a device without deleting it from memory |
|
|
Term
|
Definition
A security method used to remove and permanently delete sensitive data from a mobile device when it is not in the authorized user's physical possession |
|
|
Term
|
Definition
A cryptographic attack where the attacker intercepts session keys or authentication traffic and uses them later to authenticate and gain access |
|
|
Term
|
Definition
A software vulnerability that can occur when software does not properly restrict access to requested or needed resources |
|
|
Term
|
Definition
The practice of deconstructing software into its base components so that its properties are easier to understand |
|
|
Term
|
Definition
A technology that uses electromagnetic fields to automatically identify and track tags or chips that a.re affixed to selected objects and that store information about the objects |
|
|
Term
|
Definition
A routing protocol that configures routers to periodically broadcast their entire routing tables. RIP routers broadcast their tables regardless of whether or not any changes have occurred on the network |
|
|
Term
|
Definition
A message digest algorithm that is based on the design principles used in MD4 |
|
|
Term
|
Definition
An information security concept that indicates exposure to the chance of damage or loss, and signifies the likelihood of a hazard or dangerous threat |
|
|
Term
|
Definition
The security process used for assessing risk damages that affect an organization |
|
|
Term
|
Definition
The process of identifying risks, analyzing iliem, developing a response strategy for them, and mitigating their future impact |
|
|
Term
|
Definition
The record of risk information as represented in tables or graphs |
|
|
Term
|
Definition
An unauthorized wireless access point on a corporate or private network that allows unauthorized individuals to connect to the network |
|
|
Term
|
Definition
An unknown or unrecognized device that is connected to a network, often with malicious intent |
|
|
Term
|
Definition
A collection of previously issued patches and hot fixes, usually meant to be applied to one component of a system, such as the web browser or a particular service |
|
|
Term
|
Definition
The top-most CA in the hierarchy and consequently, the most trusted authority in the hierarchy |
|
|
Term
|
Definition
Technology that enforces a hardware platform's trusted computing architecture through encryption mechanisms designed to keep data confidential and to prevent tampering |
|
|
Term
|
Definition
The process of enabling root privileges on an Android device |
|
|
Term
|
Definition
Software that is intended to take full or partial control of a system at the lowest levels |
|
|
Term
|
Definition
A simple substitution cipher that replaces a letter with the letter that is 13 letters after it in the alphabet |
|
|
Term
|
Definition
A scheduling approach used by load balancers to route traffic to devices one by one according to a list |
|
|
Term
|
Definition
A device that connects multiple networks that use the same protocol |
|
|
Term
|
Definition
The longest period of time that an organization can tolerate lost data being unrecoverable |
|
|
Term
|
Definition
The first successful algorithm to be designed for public key encryption. It is named for its designers, Rivest, Shamir, and Adelman |
|
|
Term
|
Definition
A subscription technology that enables users to subscribe to a "feed" of each website that interests them |
|
|
Term
|
Definition
The length of time it takes after an event to resume normal business operations and activities |
|
|
Term
|
Definition
A specialized operating system that uses a more consistent processor scheduler than a standard operating system |
|
|
Term
|
Definition
A protocol that provides audio and video streaming media over a TCP /IP network |
|
|
Term
rule-based access control |
|
Definition
A non-discretionary access control technique that is based on a set of operational rules or restrictions |
|
|
Term
|
Definition
Source code that is interpreted by an intermediary run time environment that runs the code, rather than the system executing the code directly |
|
|
Term
|
Definition
A relatively complex key algorithm that when given the key, provides a substitution key in its place |
|
|
Term
|
Definition
An email encryption standard that adds digital signatures and public key cryptography to traditional MIME communications |
|
|
Term
|
Definition
A computing method that uses the cloud to provide application services to users |
|
|
Term
|
Definition
An XML-based data format used to exchange authentication information between a client and a service |
|
|
Term
|
Definition
An extension to the X.509 certificate standard that enables organizations to configure a certificate's scope to encompass multiple domains |
|
|
Term
|
Definition
A data disposal method that completely removes all data from a storage medium at the virtual level |
|
|
Term
|
Definition
A form of wireless transmission that transfers radio signals to and from orbiting satellites to reach long distances |
|
|
Term
|
Definition
A type of industrial control system that monitors and controls industrial processes such as manufacturing and fabrication, infrastructure processes such as power transmission and distribution, and facility processes such as energy consumption and HVAC systems |
|
|
Term
|
Definition
the property by which a computing environment is able to gracefully fulfill its ever- increasing resource needs |
|
|
Term
|
Definition
The process of adding more resources in parallel with existing resources to achieve scale ability |
|
|
Term
|
Definition
The process of increasing the power of existing resources to achieve scale ability |
|
|
Term
|
Definition
The phase of the hacking process in which the attacker uses specific tools to determine organization's infrastructure and discover vulnerabilities |
|
|
Term
|
Definition
A method used by load balancers to determine which devices should have traffic muted to them |
|
|
Term
|
Definition
A set of rules in a directory service for how objects are created and what the.r characteristics can be |
|
|
Term
|
Definition
A protocol that is used to securely transfer computer files between a local and a remote host, or between two remote hosts, using SSH |
|
|
Term
|
Definition
An object attached to a screen that conceals the contents of the screen from certain viewing angles |
|
|
Term
|
Definition
An inexperienced hacker with limited technical knowledge who relies on automated tools to hack |
|
|
Term
|
Definition
The process of designing and deploying software from the initial planning stages before the app is deployed, all the way to its obsolescence |
|
|
Term
|
Definition
A networking implementation that simplifies the process of administrating a network by separating systems that control where traffic is sent from systems that actually forward this traffic to its destination |
|
|
Term
|
Definition
A computing method that enables clients to take advantage of information, software, infrastructure, and processes provided by a cloud vendor in the specific area of computer security |
|
|
Term
|
Definition
The phase of the hacking process in which the attacker uses specific tools to determine an Organizations infrastructure & Discover vulnerabilities |
|
|
Term
|
Definition
A UEFI feature that prevents unwanted processes from executing during the boot operation |
|
|
Term
|
Definition
A storage device that is encrypted at the hardware level in order to avoid relying on software solutions |
|
|
Term
|
Definition
A secure version of the File Transfer Protocol that uses a Secure Shell tunnel as an encryption method to transfer, access, and manage files |
|
|
Term
|
Definition
A version of the Internet Message Access Protocol that uses SSL or TLS to provide secure communications between a mail client and the mail server |
|
|
Term
|
Definition
A method of implementing LDAP using SSL/TLS encryption |
|
|
Term
|
Definition
A version of the Post Office Protocol that uses SSL or TLS to provide secure communications between a mail client and the mail server |
|
|
Term
security architecture review |
|
Definition
An evaluation of an organization's current security infrastructure model and security measures |
|
|
Term
|
Definition
The process of testing security controls through a comprehensive set of techniques aimed at exposing any weaknesses or gaps in your tools, technologies, services, and operations |
|
|
Term
|
Definition
The act of performing an organized technical assessment of the security strengths and weaknesses of a computer system to ensure that the system is in compliance |
|
|
Term
|
Definition
A conceptual structure for security operations within the organization |
|
|
Term
|
Definition
A formalized statement that defines how security will be implemented within a particular organization |
|
|
Term
security through obscurity |
|
Definition
The practice of attempting to hide the existence of vulnerabilities from others |
|
|
Term
|
Definition
A type of digital certificate that is owned by the entity that signs it |
|
|
Term
|
Definition
A concept that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse of powers |
|
|
Term
|
Definition
A collection of system updates that can include functionality enhancements, new features, and typically all patches, updates, and hot fixes issued up to the point of the release of the service pack |
|
|
Term
|
Definition
A type of hijacking attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services |
|
|
Term
|
Definition
A single-use symmetric key used for encrypting all messages in a series of related communications |
|
|
Term
|
Definition
An early unsecured file transfer protocol that has since been declared obsolete |
|
|
Term
|
Definition
A hash algorithm modeled after MD5 and considered the stronger of the two. It has multiple versions that produce different sized hash values |
|
|
Term
|
Definition
An identity federation method that provides single sign-on capabilities and enables websites to make informed authorization decisions for access to protected online resources |
|
|
Term
|
Definition
The process of developing and implementing additional code between an application and the operating system to enable functionality that would otherwise be unavailable |
|
|
Term
|
Definition
A human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN |
|
|
Term
|
Definition
An attack in which an attacker gleans information from the physical implementation of a cryptographic technique and uses that information to analyze and potentially break the implementation |
|
|
Term
|
Definition
The practice of directly installing an app package on a mobile device instead of downloading it through an app store |
|
|
Term
|
Definition
A solution that provides real-time or near real time analysis of security alerts generated by network hardware and applications |
|
|
Term
signature-based monitoring |
|
Definition
A network monitoring system that uses a predefined set of rules provided by a software vendor or security personnel to identify events that are unacceptable |
|
|
Term
|
Definition
The collection of information on a location for the purposes of building the most ideal infrastructure |
|
|
Term
|
Definition
A business agreement that defines what services and support are provided to a client |
|
|
Term
|
Definition
A sudden, temporary surge in traffic to a website that occurs when another website or other source posts a story that refers visitors to the victim website |
|
|
Term
|
Definition
The financial loss expected from a single adverse event |
|
|
Term
|
Definition
A device similar to a credit card that can store authentication information, such as a user's private key, on an embedded microchip |
|
|
Term
|
Definition
An electronic device, other than a typical computer, that is connected to a network and has some computing properties |
|
|
Term
|
Definition
A human-based attack where the attacker extracts personal information by using SMS text messages |
|
|
Term
|
Definition
The state of a virtual machine at a specific point in time |
|
|
Term
|
Definition
A device or program that monitors network communications on the network wire or across a wireless network and captures data |
|
|
Term
|
Definition
A network attack that uses a protocol analyzer to gain access to private communications on the network wire or across a wireless network |
|
|
Term
|
Definition
An application-layer service used to exchange information between network devices |
|
|
Term
|
Definition
An embedded systems component that consolidates the functionality of a CPU, memory module, and peripherals. Also known as system on chip (SoC) |
|
|
Term
|
Definition
Any activity where the goal is to use deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines |
|
|
Term
|
Definition
Any attack that targets software resources, including operating systems, applications, services, protocols, and files |
|
|
Term
|
Definition
A federally mandated publication of any system of record in the Federal Register |
|
|
Term
|
Definition
Software instructions, written in a Human readable programming language, that are to be executed by a computer. Access to source code enables a programmer to change how a piece of software functions |
|
|
Term
|
Definition
An email-based threat that floods the user's inbox with emails that typically carry unsolicited advertising material for products or other spurious content, and which sometimes deliver viruses. It can also be utilized within social networking sites such as Facebook and Twitter |
|
|
Term
|
Definition
A program that will detect specific words that are commonly used in spam messages |
|
|
Term
|
Definition
A collection of information that is optimized for data that represents objects contained in a geometric space |
|
|
Term
|
Definition
An email-based or web-based form of phishing that targets a specific individual or organization |
|
|
Term
|
Definition
An IM-based attack just like spam but which is propagated through instant messaging instead of through email |
|
|
Term
|
Definition
A network-based attack where the goal is to pretend to be someone else for the purpose of identity concealment |
|
|
Term
|
Definition
Surreptitiously installed malware that is intended to track and report the usage of a target system or collect other data the attacker wishes to obtain |
|
|
Term
|
Definition
A programming and query language common to many large scale database systems. |
|
|
Term
|
Definition
An attack that injects a database query into the input data directed at a server by accessing the client side of the application |
|
|
Term
|
Definition
A protocol that provides audio and video streaming media over a TCP /IP network and uses encryption services to uphold the authenticity and integrity of streaming media, as well as to protect against replay attacks |
|
|
Term
|
Definition
A protocol for secure remote logon and secure transfer of data |
|
|
Term
|
Definition
A continuous announcement by a WAP that transmits its name so that wireless devices can discover it |
|
|
Term
|
Definition
A security protocol that uses certificates for authentication and encryption to protect web communication |
|
|
Term
|
Definition
A hardware interface that helps offload the resource-intensive encryption calculations in SSL/TLS to reduce overhead for a server |
|
|
Term
|
Definition
An aspect of privilege management that provides users with one-time authentication to multiple resources, servers, or sites |
|
|
Term
|
Definition
A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet with a PPP header and then with an SSTP header |
|
|
Term
|
Definition
The process of setting up an environment through which an asset can be quickly and easily deployed for testing purposes |
|
|
Term
|
Definition
A document that defines how to measure the level of adherence to a policy. |
|
|
Term
standard operating procedure |
|
Definition
A collection of procedures that dictate how policy components are implemented |
|
|
Term
|
Definition
A firewall that tracks the active state of a connection, and can make decisions based on the contents of a network packet as it relates to the state of the connection |
|
|
Term
|
Definition
A firewall that does not track the active state of a connection as it reaches the firewall |
|
|
Term
|
Definition
The process of reviewing source code while it is in a static state, i.e., it is not executing |
|
|
Term
|
Definition
A type of port scan that identifies open ports without completing the three-way handshake |
|
|
Term
|
Definition
An alternative encryption technique that hides a secret message by enclosing it in an ordinary file |
|
|
Term
|
Definition
The practice of compartmentalizing different types of data on one or more storage media, such as isolating a mobile device's OS and base apps from the apps and data added by the user |
|
|
Term
|
Definition
One of a set of pre-compiled database statements that can be used to validate input to a database |
|
|
Term
|
Definition
A switching protocol that prevents network loops by dynamically disabling links as needed |
|
|
Term
|
Definition
A relatively fast type of encryption that encrypts data one bit at a time |
|
|
Term
|
Definition
A software testing method that evaluates how software performs under e.xtreme load |
|
|
Term
|
Definition
In DNS, a logical division of an organizational domain, such as sales.develetech.com |
|
|
Term
|
Definition
The division of a large network into smaller logical networks |
|
|
Term
|
Definition
Any CA below the root CA in the hierarchy |
|
|
Term
|
Definition
An obfuscation technique where each unit of plaintext is kept in the same sequence when converted to ciphertext, but the actual value of the unit changes |
|
|
Term
|
Definition
A documented plan that ensures that all key business personnel have one or more designated backups who can perform critical functions when needed |
|
|
Term
|
Definition
The end-to-end process of supplying, manufacturing, distributing, and finally releasing goods and services to a customer |
|
|
Term
|
Definition
A device that has multiple network ports and combines multiple physical network segments into a single logical network |
|
|
Term
|
Definition
A two-way encryption scheme in which encryption and decryption are both pet-formed by the same key. Also known as shared-key encryption |
|
|
Term
|
Definition
A collection of information that uses an individual's name or an identifying number, symbol, or other identification Scheme |
|
|
Term
|
Definition
A discussion-based session where disaster recovery team members discuss their roles in emergency situations, as well as their responses to particular situations |
|
|
Term
|
Definition
A remote access protocol that provides centralized authentication and authorization services for remote users |
|
|
Term
|
Definition
Cisco's extension to the TACACS protocol that provides multi-factor authentication |
|
|
Term
|
Definition
A human-based attack where an attacker enters a secure area by following a legitimate employee without the employee's knowledge or permission |
|
|
Term
|
Definition
A type of software attack where an attacker gains access to a remote host and takes control of the system |
|
|
Term
|
Definition
The hardware, firmware, and software components of a computer system that implement the security policy of a system |
|
|
Term
|
Definition
A non-proprietary, mutable network protocol suite that enables computers to communicate over all types of networks |
|
|
Term
|
Definition
Hardware or software installations that are implemented to monitor and prevent threats and attacks to computer systems and services |
|
|
Term
|
Definition
Technology that provides voice and video communications through devices over a distance |
|
|
Term
|
Definition
A network protocol that enables a client to initiate remote command access to a host over TCP/ IP |
|
|
Term
|
Definition
The process of sharing a wireless Internet connection with multiple devices |
|
|
Term
|
Definition
An insecure, limited version of FTP used primarily to automate the process of configuring boot files between computers |
|
|
Term
|
Definition
Any event or action that could potentially cause damage to an asset |
|
|
Term
|
Definition
An entity that is partially or wholly responsible for an incident that affects or has the potential to affec organization's security |
|
|
Term
|
Definition
The process by which a TCP connection is completed between two hosts, where a host sends a SYN packet to the host it needs to communicate with, that host sends a SYNĀ ACK packet back, and the originating host sends an ACK packet to complete the connection |
|
|
Term
|
Definition
A security protocol created by the IEEE 802.1 li task group to replace WEP |
|
|
Term
|
Definition
(Transport Layer Security) A security protocol that uses certificates and public key cryptography for mutual authentication and data encryption over a TCP /IP connection |
|
|
Term
|
Definition
A physical or virtual object that stores authentication information |
|
|
Term
|
Definition
The operating system component of the TCB that protects the resources from applications |
|
|
Term
|
Definition
(timed HMAC-based one-time password) An improvement on HOTP that forces one-time passwords to expire after a short period of time |
|
|
Term
|
Definition
A specification that includes the use of cryptoprocessors to create a secure computing environment |
|
|
Term
|
Definition
A principle in which one entity implicitly trusts another entity because both of them trust the same third party |
|
|
Term
|
Definition
A type of malware that hides itself on an infected system and can cause damage to a system or give an attacker a platform for monitoring and/or controlling a system |
|
|
Term
|
Definition
A single CA or group of CAs that work together to issue digital certificates |
|
|
Term
|
Definition
A data-transport technique in which a data packet is encrypted and encapsulated in another data packet in order to conceal the info1mation of the packet inside |
|
|
Term
|
Definition
A symmetric key block cipher, similar to Blowfish, consisting of a block size of 128 bits and key sizes up to 256 bits |
|
|
Term
|
Definition
An attack in which an attacker registers a domain name with a common misspelling of an existing domain, so that a user who misspells a URL they enter into a browser is taken to the attacker's website |
|
|
Term
|
Definition
A firmware interface that initializes hardware for an operating system boot. |
|
|
Term
|
Definition
An attack in which an attacker registers a domain name with a common misspelling of an existing domain, so that a user who misspells a URL they enter into a browser is taken to the attacker's website |
|
|
Term
|
Definition
An external media solution where two devices connect over USB in a master/slave configuration |
|
|
Term
|
Definition
The practice of centralizing various security techniques into a single appliance |
|
|
Term
|
Definition
A VM that runs a desktop operating system |
|
|
Term
|
Definition
A virtualization implementation that separates the personal computing environment from a user's physical computer |
|
|
Term
|
Definition
The practice of ensuring that the assets that make up a project are closely managed when it comes time to make changes |
|
|
Term
|
Definition
The practice of ensuring that the assets that make up a project are closely managed when it comes time to make changes |
|
|
Term
|
Definition
The process of creating a simulation of a computing environment, where ilie virtualized system can simulate the hardware, operating system, and applications of a typical computer wiiliout being a separate physical computer |
|
|
Term
|
Definition
A self-replicating piece of malicious code that spreads from computer to computer by attaching itself to different files |
|
|
Term
|
Definition
A human-based attack where the attacker extracts information while speaking over the phone or leveraging IPĀ based voice messaging services (VoIP). |
|
|
Term
|
Definition
A logical method of segmenting a network at the Data Link layer layer 2) of the OSI model |
|
|
Term
|
Definition
A virtualized computer that consists of an operating system and applications that run in a virtual environment that simulates dedicated physical hardware |
|
|
Term
|
Definition
An exploit where an attacker executes code in a VM that allows an application mnning on the VM to "escape" the virtual environment and interact directly with the hypervisor |
|
|
Term
|
Definition
A situation where the number of virtual machines exceeds the organization's ability to control or manage all of those virtual machines |
|
|
Term
|
Definition
A mobile deployment model that allows employees' devices to connect to VMs that run mobile operating systems so that they can perform work tasks in a controlled environment |
|
|
Term
|
Definition
A collection of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of VMs over the course of their existence |
|
|
Term
|
Definition
A term used for a technology that enables telephony communications over a network by using the IP protocol |
|
|
Term
|
Definition
A method of extending a private network by tunneling though a public network, such as the Internet |
|
|
Term
|
Definition
A single device that incorporates advanced encryption and authentication methods in order to handle a large number of VPN tunnels |
|
|
Term
|
Definition
Any condition that leaves an information system open to harm |
|
|
Term
|
Definition
A security assessment that evaluates a system's security and its ability to meet compliance requirements based on the configuration state of the system |
|
|
Term
|
Definition
A firewall that is deployed to secure an organization's web applications and other application-based infrastructure from attackers |
|
|
Term
|
Definition
A wireless threat where the attacker uses symbols to mark up a sidewalk or wall to indicate the presence and status of a nearby wireless network |
|
|
Term
|
Definition
A wireless threat where the attacker searches for instances of wireless LAN networks while in motion in a motor vehicle, by using wireless tracking devices like mobile phones, smartphones, tablets, or laptops |
|
|
Term
|
Definition
A wireless threat where the attacker searches for instances of wireless LAN networks while on foot, by using wireless tracking devices like mobile phones, smartphones, tablets, or laptops. Typically used in high-density areas such as malls, hotels, and city centers |
|
|
Term
|
Definition
A location that is dormant or performs nonĀ critical functions under normal conditions, but which can be rapidly converted to a key operations site if needed |
|
|
Term
|
Definition
A software development model where the phases of the SDLC cascade so that each phase will start only when all tasks identified in the previous phase are complete |
|
|
Term
|
Definition
An attack in which an attacker targets a specific group, discovers which websites that group frequents, then injects those sites with malware so that visitors to the sites will become infected |
|
|
Term
|
Definition
An application attack that focuses on those applications that run in web browsers |
|
|
Term
|
Definition
A deprecated protocol that provides 64-bit, 128-bit, and 256- bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols |
|
|
Term
|
Definition
A form of spear phishing that targets particularly wealthy individuals or organizations |
|
|
Term
|
Definition
The practice of allowing approved progran1s to run on a computer, computer network, or mobile device |
|
|
Term
|
Definition
Technology that enables two mobile devices to connect to each other without a wireless access point |
|
|
Term
|
Definition
A type of NIDS that scans the radio frequency spectrum for possible threats to the wireless network, primarily rogue access points |
|
|
Term
|
Definition
A type of digital certificate that enables organizations to configure a certificate's scope to encompass multiple subdomains |
|
|
Term
|
Definition
An active, inline security device that monitors suspicious network and/or system traffic on a wireless network and reacts in real time to block it |
|
|
Term
wireless disassociation attack |
|
Definition
A type of wireless attack where an attacker spoofs the MAC address of a wireless access point to force a target device to try and reĀ associate with the WAP. |
|
|
Term
|
Definition
A self-replicating piece of malicious code that spreads from computer to computer without attaching to different files |
|
|
Term
|
Definition
A storage medium used in SIEM to maintain the integrity of the security data being compiled |
|
|
Term
|
Definition
A wireless encryption protocol that generates a 128-bit key for each packet sent. Superseded by WPA2 |
|
|
Term
|
Definition
An improvement to the WPA protocol that implements all mandatory components of the 802.1li standard, including Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption for increased security, and a 128- bit encryption key |
|
|
Term
|
Definition
An insecure feature of WPA and WPA2 that allows enrollment in a wireless network based on an 8-digit PIN |
|
|
Term
|
Definition
A standard for formatting digital certificates that defines the structure of a certificate with the information that was provided in a CSR |
|
|
Term
|
Definition
A widely adopted markup language used in many documents, websites, and web applications |
|
|
Term
|
Definition
An application attack that injects corrupted XML query data so that an attacker can gain access to the XML data structure and input malicious code or read private data |
|
|
Term
|
Definition
An operation that outputs to true only if one input is true and the other input is false |
|
|
Term
|
Definition
(cross-site scripting) A web application attack where the attacker takes advantage of scripting and input validation vulnerabilities in an interactive website to attack legitimate users |
|
|
Term
|
Definition
An extension to the original TACACS protocol |
|
|
Term
|
Definition
An application attack that occurs immediately after a vulnerability is identified, when the security level is at its lowest |
|
|
Term
|
Definition
A software vulnerability that a malicious user is able to exploit before the vulnerability is publicly known or known to the developers, and before those developers have a chance to issue a fix |
|
|
Term
|
Definition
A computer that has been infected with a bot and is being used by an attacker to mount an attack. Also called a drone |
|
|
Term
software development lifecycle |
|
Definition
The process of designing and deploying software from the initial planning stages before the app is deployed, all the way to its obsolescence |
|
|
Term
wireless intrusion detection system |
|
Definition
A type of NIDS that scans the radio frequency spectrum for possible threats to the wireless network, primarily rogue access points |
|
|
Term
|
Definition
A policy that defines the rules for user behavior with regard to using organizational resources. |
|
|
Term
|
Definition
On a router, a list that is used to filter network traffic and implement anti-spoofing measures. In a DAC access control scheme, a list that is associated with each object, specifying the subjects that can access the object and their levels of access. |
|
|
Term
address resolution protocol |
|
Definition
The mechanism by which individual hardware MAC addresses are matched to an IP address on a network. |
|
|
Term
advance persistent threat |
|
Definition
A threat that uses multiple attack vectors to gain unauthorized access to sensitive resources and then maintain that access for a long period of time. |
|
|
Term
advanced encryption standarf |
|
Definition
A symmetric 128-, 192-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES. |
|
|
Term
|
Definition
An analysis of events that can provide insight into how to improve response processes in the future. |
|
|
Term
annual rate of occurrence |
|
Definition
How many times per year a particular loss is expected to occur. |
|
|
Term
|
Definition
The total cost of a risk to an organization on an annual basis. |
|
|
Term
attribute based access control |
|
Definition
An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted. |
|
|
Term
authentication authroization and accounting |
|
Definition
A security concept where a centralized platform verifies object identification, ensures the object is assigned relevant permissions, and then logs these actions to create an audit trail. |
|
|
Term
|
Definition
An IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks. |
|
|
Term
|
Definition
A mobile deployment model that describes how employees can use their own personal mobile devices to get work done, if they so choose. |
|
|
Term
|
Definition
A policy that describes and ratifies the organization's overall business continuity strategy. |
|
|
Term
|
Definition
A systematic activity that identifies organizational risks and determines their effect on ongoing, missionĀ critical operations. |
|
|
Term
business partnership agreement |
|
Definition
A business agreement that defines how a partnership between organizations will be conducted, and what is expected of each organization. |
|
|
Term
|
Definition
A server that can issue digital certificates and the associated public/ private key pairs. |
|
|
Term
certificate revocation list |
|
Definition
A list of certificates that were revoked before their expiration dat |
|
|
Term
certificate signing request |
|
Definition
A message sent to a certificate authority in which a resource applies for a certificate |
|
|
Term
challange handshake authentication protocol |
|
Definition
An encrypted remote access authentication method that enables connections from any authentication method requested by the server, except for PAP and SPAP unencrypted authentication. |
|
|
Term
|
Definition
A mobile deployment model that allows employees to select a mobile device from a list of accepted devices to use for work purposes. |
|
|
Term
|
Definition
An encryption mode of operation where an exclusive or (XOR) is applied to the first plaintext block. |
|
|
Term
|
Definition
An encryption mode of operation where an initialization vector (IV) is encrypted before its result is XORed with the previous plaintext block. |
|
|
Term
|
Definition
The use of surveillance cameras that do not openly broadcast signals. |
|
|
Term
clous access security broker |
|
Definition
A service offered by some SECaaS vendors to establish security gateways sitting between the organization's onĀ premises network and the cloud network, ensuring that traffic both ways complies with policy. |
|
|
Term
|
Definition
A smart card that provides certificate-based authentication and supports two-factor authentication |
|
|
Term
|
Definition
A set of standards developed by a group of governments worlcing together to create a baseline of security assurance for a trusted operating system (TOS). |
|
|
Term
confidentiality, intergrity and availability triad |
|
Definition
The three basic principles of security control and management: confidentiality, integrity, & availability. Also known as the information security triad or triple. |
|
|
Term
control objectives for information and related technology version 5 |
|
Definition
A framework for IT management and governance created by ISACA |
|
|
Term
|
Definition
|
|
Term
Corporate owner personally enabled |
|
Definition
A mobile deployment model that allows the organization to choose which devices they want employees to work with, while still allowing the employee some freedom to use the device for personal activities |
|
|
Term
counter mode with cipher block chaining message authentication code protocol |
|
Definition
An AES cipher-based encryption protocol used in WPA2. |
|
|
Term
|
Definition
An encryption mode of operation where a numerical counter value is used to create a constantly changing IV |
|
|
Term
|
Definition
An encryption mode of operation where a numerical counter value is used to create a constantly changing IV |
|
|
Term
|
Definition
A metric for biometric devices that describes the threshold values of the FAR and FRR. A low CER signifies a highly accurate biometric system. |
|
|
Term
|
Definition
A web application attack where the attacker takes advantage of scripting and input validation vulnerabilities in an interactive website to attack legitimate users |
|
|
Term
cross site request forgery |
|
Definition
A web application attack that takes advantage of the trust established between an authorized user of a website & the website itself |
|
|
Term
cryptographic service provider |
|
Definition
A cryptographic module that implements Microsoft's CryptoAPI |
|
|
Term
|
Definition
A symmetric encryption algorithm that encrypts data in 64- bit blocks using a 56-bit key, with 8 bits used for parity |
|
|
Term
data execution prevention |
|
Definition
A Windows feature that prevents malicious code in memory from executing |
|
|
Term
data loss/leak prevention |
|
Definition
A software solution that detects and prevents sensitive information in a system or network &om being stolen or otherwise falling into the wrong hands |
|
|
Term
|
Definition
A small section of a private network that is located behind one firewall or between two firewalls and made available for public access |
|
|
Term
|
Definition
A network-based attack where the attacker disables systems that provide network services by consuming a network link's available bandwidth, consuming a single system's available resources, or exploiting programming flaws in an application or operating system |
|
|
Term
|
Definition
A cryptographic protocol that provides for secure key exchange |
|
|
Term
|
Definition
A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange by using ephemeral keys. |
|
|
Term
digital signature algorithm |
|
Definition
A public key encryption standard used for digital signatures that provides authentication and integrity verification for messages |
|
|
Term
|
Definition
A policy that describes and ratifies the organization's disaster recovery strategy |
|
|
Term
discretionary access control |
|
Definition
In this, access is controlled based on a user's identity. Objects are configured with a list of users who are allowed access to them. An administrator has the discretion to place the user on the list or not. If a user i-s on the list, the user is granted access; if the user is not on the list, access is denied |
|
|
Term
domain name security extension |
|
Definition
A security protocol that provides authentication of DNS data and upholds DNS data integrity |
|
|
Term
|
Definition
The service that maps names to IP addresses on most TCP/IP networks, including the Internet |
|
|
Term
|
Definition
A type of digital certificate that proves that some entity has control over a particular domain name. Considered to be weaker than EV |
|
|
Term
dynamic host configuration protocol |
|
Definition
A protocol used to automatically assign IP addressing information to IP network computers. |
|
|
Term
EAP-flexible authentication via secure tunneling |
|
Definition
An EAP method that is expected to address the shortcomings of LEAP. |
|
|
Term
EAP-transport layer security |
|
Definition
An EAP method that requires a client-side certificate for authentication using SSL/TLS. |
|
|
Term
electro magnetic interference |
|
Definition
A disruption of electrical current that occw:s when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit |
|
|
Term
|
Definition
A short burst of electrical interference caused by an abrupt and rapid acceleration of charged particles, which can short-circuit and damage electronic components |
|
|
Term
|
Definition
An encryption mode of operation where each plaintext block is encrypted with the san1e key |
|
|
Term
elliptic curve cryptography |
|
Definition
An asymmetric encryption technique that leverages the algebraic structures of elliptic curves over finite fields |
|
|
Term
elliptic curve diffie - hellman ephemeral |
|
Definition
(Elliptic Curve Diffie-Hellman Ephemeral) A cryptographic protocol that is based on DiffieĀ Hellman and that provides for secure key exchange by using ephemeral keys and elliptic curve cryptography |
|
|
Term
encapsulation security yaload |
|
Definition
An IPSec protocol that provides authentication for the origin of transmitted data, integrity and protection against replay attacks, and encryption to support the confidentiality of transmitted data |
|
|
Term
|
Definition
Micrnsoft Windows NTFS-based public key encryption |
|
|
Term
enhanced interior gateway routing protocol |
|
Definition
An improvement over IGRP that indudes features that support VLSM and classful and classless subnet masks |
|
|
Term
|
Definition
see CER (crossover error rate) A metric for biometric devices that describes the threshold values of the FAR and FRR. A low CER signifies a highly accurate biometric system |
|
|
Term
evaluation assurance level |
|
Definition
A rating from 1 to 7 that states the level of secure features offered by an operating system as defined by the Common Criteria (CC) |
|
|
Term
|
Definition
An operation that outputs to true onif one input is true and the other input is false |
|
|
Term
|
Definition
Considered to be stronger than DV |
|
|
Term
extensible authentication protocol |
|
Definition
A wireless authentication protocol that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication |
|
|
Term
Extensible Markup language |
|
Definition
A widely adopted markup language used in many documents, websites, and web applications |
|
|
Term
|
Definition
A metric for biometric devices that describes the percentage of authorized users who were incorrectly rejected by a biometric system |
|
|
Term
|
Definition
A metric for biometric devices that describes the percentage of unauthorized users who were incorrectly authenticated by a biometric system |
|
|
Term
|
Definition
A communications protocol that enables the transfer of files between a user's workstation and a remote host |
|
|
Term
file transfer protocol secure |
|
Definition
A protocol that combines the use of FTP with additional support for TLS and SSL |
|
|
Term
file transport protocol / secure socket layer |
|
Definition
A protocol that combines the use of FTP with additional support for TLS and SSL |
|
|
Term
file transport protocol over secure shell |
|
Definition
A secure version of the File Transfer Protocol that uses a Secure Shell tunnel as an encryption method to transfer, access, and manage files |
|
|
Term
|
Definition
A storage technology that encrypts an entire storage drive at the hardware level |
|
|
Term
|
Definition
An encryption mode of operation that adds authentication to the standard encryption services of a cipher mode |
|
|
Term
|
Definition
A free open-soucce version of PG P that provides the equivalent ennyption and authentication services |
|
|
Term
|
Definition
A physical device that provides root of trust capabilities |
|
|
Term
hash-based message authentication code |
|
Definition
A method used to verify both the integrity and authenticity of a message by combining nyptographic hash functions, such as MDS or SHA -1, with a secret key |
|
|
Term
heating ventilation and air conditioning |
|
Definition
A system that controls the air quality and flow inside a building |
|
|
Term
HMAC-base one time password |
|
Definition
An algorithm that generates a one-time password using a hash-based authentication code to verify the authenticity of the message |
|
|
Term
host -based instrusion detection system |
|
Definition
A type of IDS that monitors a computer system for unexpected behavior or drastic changes to the system's state |
|
|
Term
host-based intrusion prevention system |
|
Definition
A type of IPS that monitors a computer system for unexpected behavior or drastic changes to ilie system's state and reacts in real time to block it |
|
|
Term
hyper text transfer protocol secure |
|
Definition
A secure version of HTTP that provides a secure connection between a web browser and a server |
|
|
Term
hyper text transfer protocol |
|
Definition
A protocol that defines the interaction between a web server and a browser |
|
|
Term
identity and access management |
|
Definition
A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications |
|
|
Term
|
Definition
A document or series of documents that describe procedures for detecting, responding to, and minimizing the effects of security incidents |
|
|
Term
industrial control system |
|
Definition
A networked system that controls critical infrastructure such as water, electrical, transportation, and telecommunication services |
|
|
Term
information technology infrastructure library |
|
Definition
A comprehensive IT management structure derived from recommendations originally developed by the United Kingdom Government's Central Computer and Telecommunications Agency (CCTA) |
|
|
Term
infrastructure as a service |
|
Definition
A computing method that uses the cloud to provide any or all infrastructure needs |
|
|
Term
|
Definition
A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption |
|
|
Term
|
Definition
A type of communication service which involves a private dialogue between two persons via instant text-based messages over the Internet |
|
|
Term
institute of electrical and electronicsengineers |
|
Definition
A professional association of electrical and electronics engineers that develops industry standards for a variety of technologies |
|
|
Term
interconnection security agreement |
|
Definition
A business agreement that focuses on ensuring security between organizations in a partnership |
|
|
Term
Interior gateway routing protocol |
|
Definition
A distance-vector routing protocol developed by Cisco as an improvement over RIP and RIP v2. |
|
|
Term
Internet message access protocol over secure socket layert/tls |
|
Definition
a version of the internet Message Access Protocol that uses SSL or TLS to provide secure communication between mail client and the mail server |
|
|
Term
internet message access protocol secure |
|
Definition
) a version of the internet Message Access Protocol that uses SSL or TLS to provide secure communication between mail client and the mail server |
|
|
Term
internet message access protocol |
|
Definition
A protocol used to retrieve email messages and folders from a mail server |
|
|
Term
internet message control protocol |
|
Definition
An IP network service that reports on connections between two hosts |
|
|
Term
|
Definition
A group of objects (electronic or not) that are connected to the wider Internet by using embedded electronic components |
|
|
Term
internet protocol security |
|
Definition
A set of open, non-proprietary standards that are used to secure data through authentication and encryption as the data travels across the network or the Internet |
|
|
Term
intrusion detection system |
|
Definition
A software and/or hardware system that scans, audits, and monitors the security infrastructure for signs of attacks in progress |
|
|
Term
Intrusion prevention system |
|
Definition
An inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it |
|
|
Term
|
Definition
A cryptographic attack where the attacker has access to plaintext and the corresponding ciphertext, and tries to derive the correlation between them |
|
|
Term
layering 2 tunneling oprotocol |
|
Definition
The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP, Frame Relay, or ATM |
|
|
Term
|
Definition
An analysis of events that can provide insight into how to improve response processes in the future |
|
|
Term
lightweight directory access protocol secure |
|
Definition
A method of implementing LDAP using SSL/TLS encryption |
|
|
Term
lightweight directory access protocol |
|
Definition
A simple network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information |
|
|
Term
lightweight extensible authentication protocol |
|
Definition
Cisco Systems' proprietary EAP implementation |
|
|
Term
|
Definition
Data stored on a user's computer after visiting a website that uses Adobe Flash Player. These can be used to track a user's activity. |
|
|
Term
|
Definition
A mathematical control that takes into account the total number of key recovery agents (N) along with the number of agents required to perform a key recovery |
|
|
Term
|
Definition
A system in which objects (files and other resources) are assigned security labels of varying levels, depending on the object's sensitivity. Users are assigned a security level or clearance, and when they try to access an object, their clearance is compared to the object's security label. If there is a matcl1, the user can access the object; if there is no match, the user is denied access. |
|
|
Term
maximum tolerable down time |
|
Definition
The longest period of time a business can be inoperable without causing irrevocable business failure |
|
|
Term
mean time between failure |
|
Definition
The rating on a device or component that predicts the expected time between failures |
|
|
Term
|
Definition
The average time a device or component is expected to be in operation |
|
|
Term
mean time to repair/replace/recover |
|
Definition
(mean time to repair/replace/recover) The average time taken for a device or component to be repaired, replaced, or otherwise recover from a failure |
|
|
Term
media access control address spoofing |
|
Definition
An attack in which an attacker falsifies the factory-assigned MAC address of a device's network interface |
|
|
Term
media access control address |
|
Definition
A unique physical address assigned to each network adapter board at the time of its manufacture |
|
|
Term
media access control filtering |
|
Definition
The security technique of allowing or denying specific mac addresses from connecting to a network device. |
|
|
Term
memorandum of understanding |
|
Definition
A non-legally binding business agreement that defines a common goal that cooperating entities work toward without direct monetary compensation |
|
|
Term
|
Definition
A hash algorithm, based on RFC 1320, that produces a 128-bit hash value and is used in message integrity checks for data authentication |
|
|
Term
|
Definition
A hash algorithm, based on RFC 1321, that produces a 128-bit hash value and is used in IPSec policies for data authentication |
|
|
Term
miscorsoft chanllege handshake authentication protocol |
|
Definition
A protocol that strengthens the password authentication provided by Protected Extensible Authentication Protocol (PEAP) |
|
|
Term
|
Definition
The process of tracking, controlling, and securing an organization's mobile infrastructure |
|
|
Term
multipurpose internet management extensiion |
|
Definition
An extension of SMTP that enables the exchange of audio, video, images, applications, and other data formats through email |
|
|
Term
|
Definition
A mobile device communication standard that operates at very short range, often through physical contact |
|
|
Term
netowrk intrusion detection systems |
|
Definition
) A system that uses passive hardware sensors to monitor traffic on a specific segment of the network |
|
|
Term
netowrk intrusion preventive system |
|
Definition
An active, inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it |
|
|
Term
|
Definition
(Network Access Control) The collection of protocols, policies, and hardware that govern access of devices connecting to a network |
|
|
Term
|
Definition
A RADIUS server configUiation that uses a centralized server and clients |
|
|
Term
network addrss translation |
|
Definition
A simple form of Internet security that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-mutable addresses internally |
|
|
Term
network basic input output system |
|
Definition
A service that enables applications to properly communicate over different computers in a network |
|
|
Term
|
Definition
A challenge-response authentication protocol created by Microsoft for use in its products |
|
|
Term
|
Definition
An Internet protocol that enables synchronization of device clock times in a network of devices by exchanging time signals |
|
|
Term
|
Definition
A contract that states that an individual will not share certain sensitive infonnation to outside parties under penalty of law |
|
|
Term
nternational organization for standardization/international electrotechnical comminssion 27001 |
|
Definition
A standard model for information systems management practices created by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) |
|
|
Term
|
Definition
A series of numbers, separated by periods, that describe the identity of the owner of a digital certificate |
|
|
Term
|
Definition
A password that is generated for use in one specific session and becomes invalid after the session ends |
|
|
Term
online certificate status protocol |
|
Definition
An HTTPĀ based alternative to a certificate revocation list that checks the status of certificates |
|
|
Term
|
Definition
A token-based authorization protocol that is often used in conjunction with OpenID |
|
|
Term
|
Definition
Information that is legally collected from publicly available origins |
|
|
Term
|
Definition
An encryption mode of operation where the result of the encrypted IV is fed back to the subsequent operation |
|
|
Term
password authentication protocol |
|
Definition
A -remote access authentication service that sends user IDs and passwords as cleartext |
|
|
Term
password-based key derivation function 2 |
|
Definition
A key derivation function used in key stretclung to make potentially weak cryptographic keys such as passwords less susceptible to brute force attacks |
|
|
Term
pen systems interconnection model |
|
Definition
A method of abstracting how different layers of a network structure interact with one another |
|
|
Term
|
Definition
A characteristic of session encryption that ensures if a key used during a certain session is compromised, it should not affect data previously encrypted by that key |
|
|
Term
personal indentity verification |
|
Definition
A smart card that meets the standards for FIPS 201, in that it is resistant to tampering and provides quick electronic authentication of the card's owner |
|
|
Term
personally indentifiable information |
|
Definition
The pieces of information that a company uses or prefers to use to identify or contact an employee or other individual |
|
|
Term
|
Definition
A computing method that uses the cloud to provide any platformĀ type services. |
|
|
Term
|
Definition
The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links |
|
|
Term
point to point tunneling protocol |
|
Definition
A VPN protocol that is an extension of the PPP remote access protocol |
|
|
Term
post office protocol 3 secure |
|
Definition
a versionof the Post Office Protocol that uses SSL ot TLS to provide secure communications |
|
|
Term
|
Definition
A protocol used to retrieve email from a mailbox on the mail server |
|
|
Term
|
Definition
A string of text that a VPN or other network service expects to receive prior to any other credentials. In the context of WPA/2-Personal, the key is generated from the wireless password |
|
|
Term
|
Definition
A method of securing emails created to prevent attackers from intercepting and manipulating email and attachments by encrypting and digitally signing the contents of the email using public key cryptography |
|
|
Term
privacy impact assessment |
|
Definition
A tool for identifying and analyzing risks to privacy during the development life cycle of a program or system |
|
|
Term
privacy threshold analysis/ assessment |
|
Definition
A document used to determine when a PIA is required |
|
|
Term
propagating/plaintext chipher block chaining |
|
Definition
A encryption mode of operation in which each plaintext block is XORed with the previous plaintext and ciphertext blocks |
|
|
Term
protected exstensible authentication protocol |
|
Definition
Similar to EAP-TLS, PEAP is an open standard developed by a coalition made up of Cisco Systems, Microsoft, and RSA Security |
|
|
Term
psuedo-randon number generator |
|
Definition
The process by which an algorithm produces numbers that approximate randomness without being truly random |
|
|
Term
public key infrastructure |
|
Definition
A system that is composed of a CA, certificates, software, services, and other ci-yptographic components, for the purpose of enabling authenticity and validation of data and/or entities |
|
|
Term
RACE integrity primitives evaluation message digest |
|
Definition
A message digest algorithm that is based on the design principles used in MD4 |
|
|
Term
radio frequency indentification |
|
Definition
A technology that uses electromagnetic fields to automatically identify and track tags or chips that are affixed to selected objects and that store information about the objects |
|
|
Term
real time operating system |
|
Definition
A specialized operating system that uses a more consistent processor scheduler than a standard operating system |
|
|
Term
real time transfer protocol |
|
Definition
A protocol that provides audio and video streaming media over a TCP /IP network |
|
|
Term
|
Definition
The longest period of time that an organization can tolerate lost data being unrecoverable |
|
|
Term
redundant araary of disks |
|
Definition
A set of vendor-independent specifications that support redundancy and fault tolerance for configurations on multiple-device storage systems |
|
|
Term
|
Definition
An authority in a PKI that processes requests for digital certificates from users |
|
|
Term
|
Definition
A specialized Trojan horse that specifically aims to provide an attacker with unauthorized access to or control of a target computer |
|
|
Term
remote authetication dial-in service |
|
Definition
A standard protocol for providing centralized authentication and authorization services for remote users |
|
|
Term
|
Definition
The length of time it takes after an event to resume normal business operations and activities |
|
|
Term
|
Definition
A subscription technology that enables users to subscribe to a "feed" of each website that interests them |
|
|
Term
|
Definition
A series of variable key-length symmetric encryption algorithms developed by Ronald Rivest |
|
|
Term
role-based access control |
|
Definition
A system in which access is controlled based on a user's role. Users are assigned to roles, and network objects are configured to allow access only to specific roles. Roles are created independently of user accounts |
|
|
Term
|
Definition
A simple substitution cipher that replaces a letter with the letter that is 13 letters after it in the alphabet |
|
|
Term
routing information protocol |
|
Definition
A routing protocol that configures routers to periodically broadcast their entire routing tables. RIP routers broadcast their tables regardless of whether or not any changes have occurred on the network |
|
|
Term
|
Definition
A form of wireless transmission that transfers radio signals to and from orbiting satellites to reach long distances |
|
|
Term
|
Definition
A protocol that is used to securely transfer computer files between a local and a remote host, or between two remote hosts, using SSH |
|
|
Term
|
Definition
A hash algorithm modeled after MD5 and considered the stronger of the two. It has multiple versions that prnduce different sized hash values |
|
|
Term
secure multipurpose internet mail extension |
|
Definition
An email encryption standard that adds digital signatures and public key cryptography to traditional MIME communications |
|
|
Term
secure real time protocol |
|
Definition
A protocol that provides audio and video streaming media over a TCP /IP network and uses encryption services to uphold the authenticity and integrity of streaming media, as well as to protect against replay attacks |
|
|
Term
|
Definition
A protocol for secure remote logon and secure transfer of data |
|
|
Term
|
Definition
A security protocol that uses certificates for authentication and encryption to protect web communication |
|
|
Term
secure socket tunneling protocol |
|
Definition
A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet with a PPP header and then with an SSTP header |
|
|
Term
|
Definition
A computing method that enables clients to take advantage of information, software, infrastructure, and processes provided by a cloud vendor in the specific area of computer security |
|
|
Term
security assertion markup language |
|
Definition
An XML-based data format used to exchange authentication information between a client and a service |
|
|
Term
security information and event management |
|
Definition
A solution that provides real-time or near realĀ time analysis of security alerts generated by network hardware and applications |
|
|
Term
|
Definition
A storage device that is encrypted at the hardware level in order to avoid relying on software solutions |
|
|
Term
|
Definition
A business agreement that defines what services and support are provided to a client |
|
|
Term
service set identifier broadcast |
|
Definition
A continuous announcement by a WAP that transmits its name so that wireless devices can discover it |
|
|
Term
simple file transfer protocol |
|
Definition
An early unsecured file transfer protocol that has since been declared obsolete |
|
|
Term
simple network management protocol |
|
Definition
An application-layer service used to exchange information between network devices |
|
|
Term
|
Definition
The financial loss expected from a single adverse event |
|
|
Term
|
Definition
An aspect of privilege management that provides users with one-time authentication to multiple resources, servers, or sites |
|
|
Term
|
Definition
(Software as a Service) A computing method that uses the cloud to provide application services to users |
|
|
Term
software defined netowrking |
|
Definition
A networking implementation that simplifies the process of administrating a network by separating systems that control where traffic is sent from systems that actually forward this traffic to its destination |
|
|
Term
|
Definition
A switching protocol that prevents network loops by dynamically disabling links as needed |
|
|
Term
structured query language |
|
Definition
A programming and query language common to many largeĀ scale database systems. |
|
|
Term
|
Definition
An extension to the X.509 certificate standard that enables organizations to configure a certificate's scope to encompass multiple domains |
|
|
Term
supervisory control and data acquisitions |
|
Definition
A type of industrial control system that monitors and controls industrial prncesses such as manufacturing and fabrication, infrastructure processes such as power transmission and distribution, and facility processes such as energy consumption and HVAC systems |
|
|
Term
|
Definition
A federally mandated publication of any system of record in the Federal Register |
|
|
Term
|
Definition
An embedded systems component that consolidates the functionality of a CPU, memory module, and peripherals. Also known as system on chip (SoC) |
|
|
Term
temporal key integrity protocol |
|
Definition
A security protocol created by the IEEE 802.1 li task group to replace WEP |
|
|
Term
terminal access controller access control system |
|
Definition
A remote access protocol that provides centralized authentication and authorization services for remote users |
|
|
Term
terminal access controller access control system extension |
|
Definition
Cisco's extension to the TACACS protocol that provides multi-factor authentication |
|
|
Term
timed HMAC (based) on-time password |
|
Definition
An improvement on HOTP that forces one-time passwords to expire after a short period of time |
|
|
Term
transmission control protocol/internet protocol |
|
Definition
A non-proprietarry, mutable network protocol suite that enables computers to communicate over all types of networks |
|
|
Term
|
Definition
A security protocol that uses certificates and public key cryptography for mutual authentication and data encryption over a TCP /IP connection |
|
|
Term
trivial file transfer protocol |
|
Definition
An insecure, limited version of FTP used primarily to automate the process of configuring boot files between computers |
|
|
Term
|
Definition
The hardware, firmware, and software components of a computer system that implement the security policy of a system |
|
|
Term
|
Definition
The operating system component of the TCB that protects the resources from applications |
|
|
Term
|
Definition
A specification that includes the use of cryptoprocessors to create a secure computing environment |
|
|
Term
unified extensible firmware interface |
|
Definition
A firmware interface that initializes hardware for an operating system boot. |
|
|
Term
unified threat management |
|
Definition
The practice of centralizing various security techniques into a single appliance |
|
|
Term
|
Definition
An external media solution where two devices connect over USB in a master/slave configuration |
|
|
Term
virtual desktop environment |
|
Definition
A VM that runs a desktop operating system |
|
|
Term
virtual desktop infrastructure |
|
Definition
A virtualization implementation that separates ilie personal computing environment from a user's physical computer |
|
|
Term
virtual local area network |
|
Definition
A logical method of segmenting a network at ilie Data Link layer layer 2 of the OSI model |
|
|
Term
virtual machine lifecycle management |
|
Definition
A collection of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of VMs over the course of their existence |
|
|
Term
|
Definition
A virtualized computer that consists of an operating system and applications that run in a virtual environment that simulates dedicated physical hardware |
|
|
Term
virtual mobile infrastructure |
|
Definition
A mobile deployment model that allows employees' devices to connect to VMs that run mobile operating systems so that they can perform work tasks in a controlled environment |
|
|
Term
|
Definition
A method of extending a private network by tunneling thmugh a public network, such as the Internet |
|
|
Term
|
Definition
A term used for a technology that enables telephony communications over a network by using the IP protocol |
|
|
Term
|
Definition
A firewall that is deployed to secure an organization's web applications and other application-based infrastructure from attackers |
|
|
Term
|
Definition
An improvement to the WPA protocol that implements all mandatory components of the 802.1li standard, including Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption for increased security, and a 128- bit encryption key |
|
|
Term
|
Definition
A wireless encryption protocol that generates a 128-bit key for each packet sent. Superseded by WPA2 |
|
|
Term
|
Definition
An insecure feature of WPA and WPA2 that allows enrollment in a wireless network based on an 8-digit PIN |
|
|
Term
|
Definition
A depreciated protocol that provides 64-bit, 128-bit, and 256- bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols |
|
|
Term
wireless intrusion prevention system |
|
Definition
An active, inline security device that monitors suspicious network and/or system traffic on a wireless network and reacts in real time to block it |
|
|
Term
write once read many storage |
|
Definition
A storage medium used in SIEM to maintain the integrity of the security data being compiled |
|
|
Term
|
Definition
A symmetric encryption algorithm that encrypts data by processing each block of data 3 times |
|
|
Term
|
Definition
wireless standard for home & business that adds QoS features & Multimedia support to 802.11a & 802.11b Throughput up to 600 Mbps in the 2.4 and 5 GHz range |
|
|
Term
|
Definition
A family of wireless protocols developed by IEEE Wireless LAN Communications |
|
|
Term
|
Definition
Wireless Communication protocol that improves upon 802.11 n by adding wider channels to increase throughput |
|
|
Term
|
Definition
fast, secure but relatively expensive protocol for wireless communication.supports speeds up to 54 Mbps and 5 GHz |
|
|
Term
|
Definition
first specification to be called wifi. the least expensive wireless. supports speeds up to 11 Mbps and 2.4 GHz |
|
|
Term
|
Definition
Wireless Communication protocol that supports speeds up to 54 Mbps and 2.4 GHz that is potential replacement for 802.11b |
|
|
Term
|
Definition
Standard for encapsulating EAP Communications over LAN or Wireless LAN that provides port-based authentication |
|
|
Term
|
Definition
Authentication, Authorization & Accounting-security concept where a centralized platform verifies object ID, Assigned Permissions and Logs to create an audit trail |
|
|
Term
|
Definition
After Action Report-Analysis of events that can provide insight into how to improve response processes in the future |
|
|
Term
|
Definition
Attribute Based Access Control-Access control technique that evaluates a set of attributes that each subjects possesses-Determines if access should be granted |
|
|