Term
|
Definition
| security features that control how users and systems communicate and interact with other systems and resources |
|
|
Term
|
Definition
| the flow of information between a subject and an object |
|
|
Term
|
Definition
| An active entity that requests access to an object or the data within an object |
|
|
Term
|
Definition
| a passive entity that contains information or needed functionality |
|
|
Term
|
Definition
| Ability to access an object or file |
|
|
Term
|
Definition
| protecting data, or a resource, from being altered in an unauthorized fashion |
|
|
Term
|
Definition
| the assurance that information is not disclosed to unauthorized individuals, programs, or processes |
|
|
Term
|
Definition
| a method of ensuring that a subject (user, program, or process) is the entity it claims to be |
|
|
Term
|
Definition
| the subject is usually required to provide a second piece to the credential set. This piece could be a password, passphrase, cryptographic key, personal identification number (PIN), anatomical attribute, or token. |
|
|
Term
|
Definition
| the system determines what the subject may access to |
|
|
Term
|
Definition
| Audit logs and monitoring to track subject activities with objects |
|
|
Term
|
Definition
| technical tools used for identification, authentication, authorization, and accountability. They are software components that enforce access control measures for systems, programs, processes, and information |
|
|
Term
|
Definition
when processes carry out their tasks on a shared resource in an incorrect order
In software, when the authentication and authorization steps are split into two functions, there is a possibility an attacker could use a race condition to force the authorization step to be completed before the authentication step. This would be a flaw in the software that the attacker has figured out how to exploit. |
|
|
Term
|
Definition
| contains two out of these three methods: something a person knows, has, or is |
|
|
Term
|
Definition
| a broad and loaded term that encompasses the use of different products to identify, authenticate, and authorize users through automated means |
|
|
Term
|
Definition
| allows an administrator to configure and manage how identification, authentication, authorization, and access control take place within the network and on individual systems |
|
|
Term
|
Definition
| a way of identifying and naming the objects the directory will manage |
|
|
Term
|
Definition
| gathers the necessary information from multiple sources and stores it in one central directory |
|
|
Term
|
Definition
| virtual directory does not have the identity data in its directory but points to where the actual data reside |
|
|
Term
| Web access management (WAM) |
|
Definition
| Controls what users can access when using a web browser to interact with web-based enterprise assets |
|
|
Term
|
Definition
| allows a user to authenticate one time and then access resources in the environment without needing to re-authenticate. |
|
|
Term
|
Definition
| deals with creating user accounts on all systems, modifying the account privileges when necessary, and decommissioning the accounts when they are no longer needed |
|
|
Term
|
Definition
| the creation, maintenance, and deactivation of user objects and attributes as they exist in one or more systems, directories, or applications, in response to business processes. |
|
|
Term
| Authoritative System of Record |
|
Definition
| a hierarchical tree-like structure system that tracks subjects and their authorization chains |
|
|
Term
|
Definition
| a portable identity, and its associated entitlements, that can be used across business boundaries. It allows a user to be authenticated across multiple IT systems and enterprises |
|
|
Term
|
Definition
| A user’s identity can be a collection of her attributes (department, role in company, shift time, clearance, and others); her entitlements (resources available to her, authoritative rights in the company, and so on); and her traits (biometric information, height, sex, and so forth). |
|
|
Term
|
Definition
| Parts of a website that act as a point of access to information. A portal presents information from diverse sources in a unified manner. It can offer various services, as in e-mail, news updates, stock prices, data access, price lookups, access to databases, and entertainment |
|
|
Term
|
Definition
| pluggable user-interface software components that present information from other systems |
|
|
Term
|
Definition
HyperText Markup Language
A markup language is a way to structure text and data sets, and it dictates how these will be viewed and used.
When you adjust margins and other formatting capabilities in a word processor, you are marking up the text in the word processor’s markup language.
If you develop a web page, you are using some type of markup language. |
|
|
Term
|
Definition
| Extensible Markup Language |
|
|
Term
|
Definition
| Service Provisioning Markup Language - allows for the exchange of provisioning data between applications, allows for the automation of user management (account creation, amendments, revocation) and access entitlement configuration related to electronically published services across multiple provisioning systems. |
|
|
Term
|
Definition
| Security Assertion Markup Language - an XML standard that allows the exchange of authentication and authorization data to be shared between security domains. |
|
|
Term
|
Definition
| a collection of technologies and standards that allow services (weather updates, stock tickers, email, customer resource management, etc.) to be provided on distributed systems and be “served up” in one place. |
|
|
Term
|
Definition
| Simple Object Access Protocol - a specification that outlines how information pertaining to web services is exchanged in a structured manner. It provides the basic messaging framework, which allows users to request a service and, in exchange, the service is made available to that user |
|
|
Term
| Service oriented architecture |
|
Definition
| a way to provide independent services residing on different systems in different business domains in one consistent manner. For example, if your company has a web portal that allows you to access the company’s CRM, an employee directory, and a help-desk ticketing application, this is most likely being provided through an SOA. |
|
|
Term
|
Definition
| Extensible Access Control Markup Language - used to express security policies and access rights to assets provided through web services and other enterprise applications. |
|
|
Term
|
Definition
| scans a person’s physiological attribute or behavioral trait and compares it to a record created in an earlier enrollment process. |
|
|
Term
|
Definition
| This rating is stated as a percentage and represents the point at which the false rejection rate equals the false acceptance rate. This rating is the most important measurement when determining the system’s accuracy. |
|
|
Term
|
Definition
| scans the blood-vessel pattern of the retina on the backside of the eyeball. |
|
|
Term
|
Definition
| the colored portion of the eye that surrounds the pupil. The iris has unique patterns, rifts, colors, rings, coronas, and furrows. |
|
|
Term
|
Definition
| captures electrical signals when a person types a certain phrase. As a person types a specified phrase, the biometric system captures the speed and motions of this action. Each individual has a certain style and speed, which translate into unique signals. |
|
|
Term
|
Definition
| looks at the different peaks and valleys of the hand, along with its overall shape and curvature. |
|
|
Term
|
Definition
| a protected string of characters that is used to authenticate an individual |
|
|
Term
|
Definition
| Listening to network traffic to capture information, especially when a user is sending her password to an authentication server. |
|
|
Term
|
Definition
| a form of network attack in which a valid data transmission is maliciously or fraudulently repeated with the goal of obtaining unauthorized access. |
|
|
Term
|
Definition
| Performed with tools that cycle through many possible character, number, and symbol combinations to uncover a password. |
|
|
Term
|
Definition
| Files of thousands of words are compared to the user’s password until a match is found. |
|
|
Term
|
Definition
| An attacker falsely convinces an individual that she has the necessary authorization to access specific resources. |
|
|
Term
|
Definition
| An attacker uses a table that contains all possible passwords already in a hash format. |
|
|
Term
|
Definition
| it is used by a security professional to test the strength of a password. |
|
|
Term
|
Definition
| Tool usually used by a hacker to crack passwords |
|
|
Term
|
Definition
fact- or opinion-based information used to verify an individual’s identity
A user is enrolled by answering several questions based on her life experiences. Ex. - mother’s maiden name, favorite color, dog’s name, or the school she graduated from. |
|
|
Term
|
Definition
| also called a dynamic password. It is used for authentication purposes and is only good once. After the password is used, it is no longer valid |
|
|
Term
|
Definition
| synchronizes with the authentication service by using time or a counter as the core piece of the authentication process. |
|
|
Term
|
Definition
| employs a challenge/response scheme to authenticate the user. In this situation, the authentication server sends the user a challenge, a random value, also called a nonce. The user enters this random value into the token device, which encrypts it and returns a value the user uses as a one-time password. |
|
|
Term
|
Definition
| a sequence of characters that is longer than a password (thus a “phrase”) and, in some cases, takes the place of a password during an authentication process. The user enters this phrase into an application, and the application transforms the value into a virtual password, making the passphrase the length and format that is required by the application. |
|
|
Term
| Memory card vs. Smart card |
|
Definition
| A memory card holds information but cannot process information. A smart card holds information and has the necessary hardware and software to actually process that information. |
|
|
Term
|
Definition
| The attacker reviews the result of an encryption function after introducing an error to the card, and also reviews the correct result, which the card performs when no errors are introduced. Analysis of these different results may allow an attacker to reverse-engineer the encryption process, with the hope of uncovering the encryption key |
|
|
Term
|
Definition
| Nonintrusive and are used to uncover sensitive information about how a component works, without trying to compromise any type of flaw or Weakness. A noninvasive attack is one in which the attacker watches how something works and how it reacts in different situations instead of trying to “invade” it with more intrusive measures. |
|
|
Term
|
Definition
| similar to the least-privilege principle. It is based on the concept that individuals should be given access only to the information they absolutely require in order to perform their job duties. |
|
|
Term
|
Definition
| would allow a user to enter credentials one time and be able to access all resources allowed to user |
|
|
Term
|
Definition
| three-headed dog that guards the entrance to the underworld in Greek mythology. a security technology that provides authentication functionality, with the purpose of protecting a company’s assets. Kerberos is an authentication protocol and was designed in the mid-1980s as part of MIT’s Project Athena. It works in a client/server model and is based on symmetric key cryptography. |
|
|
Term
| Kerberos - Key Distribution Center |
|
Definition
| the most important component within a Kerberos environment. The KDC holds all users’ and services’ secret keys. It provides an authentication service, as well as key distribution functionality. |
|
|
Term
|
Definition
| can be users, applications, or network services. The KDC must have an account for, and share a secret key with, each principal |
|
|
Term
|
Definition
| generated by the ticket granting service (TGS) on the KDC and given to a principal when that principal, let’s say a user, needs to authenticate to another principal, let’s say a print server. |
|
|
Term
|
Definition
| a set of Kerboros - principals |
|
|
Term
|
Definition
| Secure European System for Applications in a Multi-vendor Environment (SESAME) project is a single sign-on technology developed to extend Kerberos functionality and improve upon its weaknesses. SESAME uses symmetric and asymmetric cryptographic techniques to authenticate subjects to network resources. |
|
|
Term
|
Definition
| When the user starts the computer, it runs a short list of instructions and then points itself to a server that will actually download the operating system, or interactive operating software, to the terminal. This enforces a strict type of access control, |
|
|
Term
| SESAME - Privileged Attribute Certificates |
|
Definition
| SESAME uses Privileged Attribute Certificates (PACs), which contain the subject’s identity, access capabilities for the object, access time period, and lifetime of the PAC. |
|
|
Term
| SESAME - Privileged Attribute Server |
|
Definition
The PAC is digitally signed so the object can validate it came from the trusted authentication server, which is referred to as the Privileged Attribute Server (PAS).
The PAS holds a similar role to that of the KDC within Kerberos. After a user successfully authenticates to the authentication service (AS), he is presented with a token to give to the PAS.
The PAS then creates a PAC for the user to present to the resource he is trying to access. |
|
|
Term
|
Definition
| a framework that dictates how subjects access objects |
|
|
Term
| discretionary access control model |
|
Definition
| (DAC) enables the owner of the resource to specify which subjects can access specific resources. This model is called discretionary because the control of access is based on the discretion of the owner. |
|
|
Term
|
Definition
MAC model - It contains a classification and different categories. The classification indicates the sensitivity level, and the categories enforce need-to know rules
In a military environment, the classifications could be top secret, secret, confidential, and unclassified. Each classification is more trusted than the one below it. A commercial organization might use confidential, proprietary, corporate, and sensitive.
The categories can correspond to departments (UN, Information Warfare, Treasury), projects (CRM, AirportSecurity, 2011Budget), or management levels. |
|
|
Term
| mandatory access control model |
|
Definition
| (MAC) model, users do not have the discretion of determining who can access objects as in a DAC model. An operating system that is based upon a MAC model greatly reduces the amount of rights, permissions, and functionality a user has for security purposes. The system can be used by the user for very focused and specific purposes, and that is it. These systems are usually very specialized and are in place to protected highly classified data. |
|
|
Term
| Role-Based Access Control model |
|
Definition
| Access decisions are based on each subject’s role and/or functional position. |
|
|
Term
|
Definition
| allows the administrator to set up an organizational RBAC model that maps to the organizational structures and functional delineations required in a specific environment. |
|
|
Term
| Rule-based access control |
|
Definition
| uses specific rules that indicate what can and cannot happen between a subject and an object |
|
|
Term
|
Definition
| mechanisms used to restrict user access to data contained in databases |
|
|
Term
|
Definition
| a table of subjects and objects indicating what actions individual subjects can take upon individual objects |
|
|
Term
| content-dependent access control |
|
Definition
| access to objects is determined by the content within the object |
|
|
Term
| Context-dependent access control |
|
Definition
| makes access decisions based on the context of a collection of information rather than on the sensitivity of the data. A system that is using context-dependent access control “reviews the situation” and then makes a decision |
|
|
Term
| centralized access control administration |
|
Definition
| one entity (department or individual) is responsible for overseeing access to all corporate resources. This entity configures the mechanisms that enforce access control |
|
|
Term
|
Definition
Remote Authentication Dial-In User Service (RADIUS) is a network protocol that provides client/server authentication and authorization, and audits remote users
RADIUS is also used within corporate environments to provide road warriors and home users access to network resources. RADIUS allows companies to maintain user
profiles in a central database. The access server and RADIUS server communicate over the RADIUS protocol.When a user dials in and is properly authenticated, a preconfigured profile is assigned to him to control what resources he can and cannot access. This technology allows companies to have a single administered entry point, which provides standardization in security and a simplistic way to track usage and network statistics. |
|
|
Term
|
Definition
Terminal Access Controller Access Control System (TACACS) provides basically the same functionality as RADIUS with a few improvments in some of its characteristics
TACACS+ uses a true authentication, authorization, and accounting/audit (AAA) architecture
RADIUS encrypts the user’s password only as it is being transmitted from the RADIUS client to the RADIUS server
TACACS+ uses TCP as its transport protocol,
while RADIUS uses UDP. UDP requires more checking for droped packets |
|
|
Term
|
Definition
| protocols are just agreed-upon ways of communication |
|
|
Term
|
Definition
Another AAA protocol that has been developed to build upon the functionality of RADIUS and overcome many of its limitations.
Provides more flexibility and capabilities to meet the new demands of today’s complex and diverse networks. |
|
|
Term
| decentralized access control administration |
|
Definition
| gives control of access to the people closer to the resources—the people who may better understand who should and should not have access to certain files, data, and resources. In this approach, it is often the functional manager who assigns access control rights to employees |
|
|
Term
| security event management |
|
Definition
| (SEM) gather logs from various devices (servers, firewalls, routers, etc.) and attempt to correlate the log data and provide analysis capabilities looking for anomalies |
|
|
Term
|
Definition
| Deleting specific incriminating data within audit logs |
|
|
Term
|
Definition
|
|
Term
|
Definition
| a type of monitoring that can review and record keystrokes entered by a user during an active session |
|
|
Term
|
Definition
| pertain to reassigning to a subject media that previously contained one or more objects. This means before someone uses a hard drive, USB drive, or tape, it should be cleared of any residual information still on it. |
|
|
Term
|
Definition
| outlines how to develop countermeasures that control spurious electrical signals emitted by electrical equipment |
|
|
Term
|
Definition
| A countermeasure used to keep intruders from extracting information from electrical transmissions is white noise. White noise is a uniform spectrum of random electrical signals. It is distributed over the full spectrum so the bandwidth is constant and an intruder is not able to decipher real information from random noise or random information. |
|
|
Term
| Intrusion detection systems |
|
Definition
| (IDSs) are designed to detect a security breach. Intrusion detection is the process of detecting an unauthorized use of, or attack upon, a computer, network, or telecommunications infrastructure. |
|
|
Term
|
Definition
(NIDS) uses sensors, which are either host computers with the necessary software installed or dedicated appliances—each with its network interface card (NIC) in promiscuous mode
When a NIC is put into promiscuous mode, the NIC driver captures all traffic, makes a copy of all packets, and then passes one copy to the TCP stack and one copy to an analyzer to look for specific types of patterns.
An NIDS monitors network traffic and cannot “see” the activity going on inside a computer itself. To monitor the activities within a computer system, a company would need to implement a host-based IDS. |
|
|
Term
|
Definition
| (HIDS) can be installed on individual workstations and/or servers to watch for inappropriate or anomalous activity |
|
|
Term
|
Definition
| Models of how the attacks are carried out |
|
|
Term
|
Definition
| a behavioral-based system do not use predefined signatures, but rather are put in a learning mode to build a profile of an environment’s “normal” activities. After this profile is built, all future traffic and activities are compared to it. |
|
|
Term
|
Definition
| preconfigured rules are applied to this data to indicate whether anything suspicious is taking place. Ie. - if a root user creates two files in the same directory and then makes a call to a specific administrative tool, an alert should be sent |
|
|
Term
| intrusion prevention system |
|
Definition
| The goal of an IPS is to detect this activity and not allow the traffic to gain access to the target in the first place, |
|
|
Term
|
Definition
| a computer set up as a sacrificial lamb on the network. Used to entice a would-be attacker to this computer instead of attacking authentic production systems on a network |
|
|
Term
|
Definition
| a general term for programs or devices able to examine traffic on a LAN segment |
|
|
Term
|
Definition
| the program hashes the dictionary words and compares the resulting message digest with the system password file that also stores its passwords in a one-way hashed format. If the hashed values match, it means a password has just been uncovered. |
|
|
Term
|
Definition
| continually tries different inputs to achieve a predefined goal. Brute force is defined as “trying every possible combination until the correct one is identified". |
|
|
Term
|
Definition
| the war dialer inserts a long list of phone numbers into a war dialing program in hopes of finding a modem that can be exploited to gain unauthorized access. |
|
|
Term
|
Definition
| attacker can use a program that presents to the user a fake logon screen, which often tricks the user into attempting to log on |
|
|
Term
|
Definition
| type of social engineering with the goal of obtaining personal information, credentials, credit card number, or financial data. The attackers lure, or fish, for sensitive data through various different methods |
|
|
Term
|
Definition
| redirects a victim to a seemingly legitimate, yet fake, web site |
|
|
Term
|
Definition
| Attacker makes a DNS server resolve a host name into an incorrect IP address |
|
|
Term
|
Definition
| this means the organization is looking for all the holes that a bad guy could somehow exploit and enter. |
|
|
Term
|
Definition
| a structured approach to identifying potential threats that could exploit vulnerabilities |
|
|