Term
| Acceptable use policy(AUP) |
|
Definition
| Rules that were made by the transit networks to restrict the use to which network may be put |
|
|
Term
|
Definition
| Suitable or ready for use or service |
|
|
Term
|
Definition
| noting or using a persons unique physical and other traits for the purpose of identification and security |
|
|
Term
|
Definition
| a brand of smartphone used for wireless e-mail |
|
|
Term
|
Definition
| identifies an organizations exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization |
|
|
Term
| Certified information system security professional(CISSP) |
|
Definition
| independent information security certification governed by International Information Systems Security Certification Consortium also known as (ISC)². (ISC)² is a self-declared non-profit organization,[1] but is not a charitable organization under the applicable Internal Revenue Service's code. |
|
|
Term
| Childrens internet protection ACT (CIPA) |
|
Definition
| The Children's Internet Protection Act (CIPA) requires that K-12 schools and libraries in the United States use Internet filters and implement other measures to protect children from harmful online content as a condition for the receipt of certain federal funding |
|
|
Term
|
Definition
| Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. |
|
|
Term
|
Definition
| is information a sender wishes to transmit to a receiver. Cleartext is often used as a synonym. |
|
|
Term
|
Definition
| Confidentiality of information, enforced in an adaptation of the military's classic "need to know" principle with both positive and negative consequences. |
|
|
Term
|
Definition
| is the technique whereby content is blocked or allowed based on analysis of its content, rather than its source or other criteria. |
|
|
Term
|
Definition
| is the result of encryption performed on plaintext using an algorithm, called a cipher. |
|
|
Term
|
Definition
| protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. |
|
|
Term
|
Definition
| is the electronic medium of computer networks, in which online communication takes place |
|
|
Term
|
Definition
| is an area, usually the frontier or boundary between two or more military powers (or alliances), where military activity is not permitted, usually by peace treaty, armistice, or other bilateral or multilateral agreement. |
|
|
Term
| Disaster recovery plan (DRP) |
|
Definition
| is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. |
|
|
Term
|
Definition
| used to refer to periods when a system is unavailable |
|
|
Term
|
Definition
| refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks |
|
|
Term
| Network interface card(NIC) |
|
Definition
| this is the physical between a computer and the ethernet LAN. It contains a unique 6-byte MAC-layer address. |
|
|
Term
|
Definition
| software encryption keys used for encrypting and decrypting keys. |
|
|
Term
| Network operations center(NOC) |
|
Definition
| the command control center for a telecommunications service provider's backbone network and customer networks. customer trouble calls are answered by the NOC in support of managed services and SLAs. |
|
|
Term
| Personal data assistant(PDA) |
|
Definition
| a handheld device that acts as a mobile computer device supporting cell phone, Internet browsing, and e-mail. |
|
|
Term
|
Definition
| stands for "packet internet groper." Ping uses the internet control message protocol(icmp) echo-request and echo-reply communications to verify end-to-end IP connectivity |
|
|
Term
|
Definition
| A list of rules and methods for communicating. |
|
|
Term
|
Definition
| A server that is placed on a DMZ LAN that acts as a middleman for data sharing between the outside world and a user. proxy servers assume risk, threats, and vulnerabilities so that the workstations they're connected to don't have to. |
|
|
Term
| Recovery time objective(RTO) |
|
Definition
| a defined metric for how long it must take to recover an IT system, application, and data access. |
|
|
Term
| RFC 1087: Ethnics and the internet |
|
Definition
| an acceptable use policy statement as issued by the internet advisory board and the US gov't defining ethics and the internet. |
|
|
Term
|
Definition
| the likelihood that something bad will happen to an asset. |
|
|
Term
|
Definition
| A U.S. federal law requiring officers of publicly traded companies to have accurate and audited financial statements. SOX also requires proper security controls to protect financial records and insider information. |
|
|
Term
| Second-level authentication |
|
Definition
| A second authentication requirement for users to gain access to more sensitive applications and data. |
|
|
Term
| Secure Sockets Layer virtual private network(SSL-VPN) |
|
Definition
| SSL-VPN is a means of securing remote access to a secure Website. In other words, it's a VPN that runs on secure sockets layer and encrypts communication to a secure Web server via a secure browser connection. |
|
|
Term
| Service level agreement(SLA) |
|
Definition
| a contractual commitment by a service provider or support organization to its customers or users. |
|
|
Term
| Simple network management prototcol(SNMP) |
|
Definition
| a non-secure connectionless UDP-based protocol that is used to transmit network -management data between IP devices and an SNMP network manager. |
|
|
Term
|
Definition
| a cellphone that runs mobile communications software and supports voice, Internet browsing, e-mail, and text messaging. |
|
|
Term
|
Definition
| An error or bug in software codea that can be exploited |
|
|
Term
|
Definition
| the complement to an IP address that defines the IP network number and IP host address. |
|
|
Term
| Systems seurity certified practioner(SSCP) |
|
Definition
| a practitioner-level information systems security professional certification offered by (ISC)^2 |
|
|
Term
|
Definition
| A non-secure application that supports remote terminal access in cleartext transmission. |
|
|
Term
|
Definition
| Any action that could damage an asset. |
|
|
Term
|
Definition
| A physical device that trnsmits a secret code to a user to authenticate the user. Can be a hardware-device token or a software generated token. |
|
|
Term
| Transmission Control Protocol/Internet Protocol(TCP/IP) |
|
Definition
| a popular suite of protocol that operate at both the Network and Transport layers of the OSI reference model. TCP/IP governs all activity across the internet and through most corporate and home networks. |
|
|
Term
| Trivial File Transfer Protocol(TFTP) |
|
Definition
| a connectionless, UDP-based file-transfer protocol used for quick and small file transfers between two IP devices. |
|
|
Term
|
Definition
| A malicious software code that appears benign to the user but actually performs a task on behalf of a perpetrator with malicious intent. |
|
|
Term
|
Definition
| The total amount of time the IT system application and data was accessible. |
|
|
Term
|
Definition
| the broadast domain in Ethernet where all workstations are on the same logical LAN. |
|
|
Term
|
Definition
| A software program that attaches itself to or copies itself into another program for the purpose of causing the computer to follow instructions that were not intended by the original program developer (infection) |
|
|
Term
|
Definition
| A weakness that allows a threat to be realized or to have an asset. |
|
|
Term
|
Definition
| a software review that identifies bugs or errors in software. |
|
|
Term
|
Definition
| The gap in time between when a software vendor releases a software or security patch and when you implement it. |
|
|
Term
| Wireless Access Point(WAP) |
|
Definition
| A radio transceiver device that transmits and recieves IP communications via LAN technology |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|