Term
|
Definition
| Ensures that resources are only granted to those users who are entitled to them |
|
|
Term
|
Definition
| The process of collecting all the legitimate account names on a system. |
|
|
Term
| Advanced Encryption Standard (AES) |
|
Definition
| An encryption standard being developed by NIST. Intended to specify an unclassified, publicly-disclosed, symmetric encryption algorithm. |
|
|
Term
|
Definition
| A finite set of step by step instructions for a probem solving or computation procedure especially one that can be implemented by a computer |
|
|
Term
|
Definition
| Public key cryptography; a modern branch of cryptography in which the algorithms employ a pair of keys and use a different component of the pair for different steps in the algorithm |
|
|
Term
|
Definition
| process of confirming the correctness of the claimed identity |
|
|
Term
|
Definition
| validity and conformance of the original information |
|
|
Term
|
Definition
| approval permission or empowerment for someone or something to do something |
|
|
Term
|
Definition
| need to ensure that the business purpose of the system can be met and that it is accessible to those who need to use it |
|
|
Term
|
Definition
| simplest web based authentication scheme that works by sending the username and password |
|
|
Term
|
Definition
| hardened in anticipation of vulnerabilities that havent been discovered |
|
|
Term
|
Definition
| algorithm that encrypts one block of data at a time |
|
|
Term
|
Definition
| process which tries to store more data in a temp data storage area than it was intended to hold |
|
|
Term
| business continuity plan BCP |
|
Definition
| the plan for emergency response, backup operations, post disaster recovery steps that will ensure the availability of critical resources |
|
|
Term
|
Definition
| mathematical and functional analysis of a cryptographic system in order break or circumvent encryption |
|
|
Term
|
Definition
| perimeter network is a network area (subnetwork) that sits between an organizations internal network and an external network, usually the internet |
|
|
Term
|
Definition
| filtering outbound traffic |
|
|
Term
|
Definition
| algorithm that computes a value based on a data object thereby mapping the data object to a smaller data object |
|
|
Term
|
Definition
|
|
Term
|
Definition
| ticket system that depends on passwords and symmetric cryptography (des) for identity authentication |
|
|
Term
|
Definition
| allowing users or applications the least amount of permisions necessary to perform intended function |
|
|
Term
|
Definition
| function which is easy to computer the output based on a given input yet given only the output value it is nearly impossible to figure out what the value is |
|
|
Term
|
Definition
| process of testing the external perimeter security of a network or facility |
|
|
Term
|
Definition
| product of the level of threat with the level of vulnerability a way to rate the likelihood of a successful attack |
|
|
Term
|
Definition
| process of detecting and defeating the use of steganography |
|
|
Term
|
Definition
| methods of hiding the existence of a message or other data |
|
|
Term
|
Definition
| encryption process that works single bit byte or computer word at a time |
|
|
Term
|
Definition
| cryptographic key that is used in both the encryption and decryption of a message |
|
|
Term
|
Definition
| method a threat uses to get to the target |
|
|
Term
|
Definition
| block cipher that transforms each 64 bit plaintext block by applying data encryption algorithm three successive times |
|
|
Term
|
Definition
| security protocal for wireless local area networks WEP |
|
|
Term
|
Definition
| anything that has value to an organization |
|
|
Term
|
Definition
| are management, operational and technical processes and procedures that act to reduce the exposure of the organization to some risks |
|
|
Term
|
Definition
| a potential cause of an unwanted incident that may result in harm to a system or organization |
|
|
Term
|
Definition
| potential that a given threat will exploit vulnerabliities of an asset or group of assets to cause loss or damage to the assets |
|
|
Term
|
Definition
| weakness in an asset or group of assets that can be exploited by a threat |
|
|
Term
|
Definition
| indicates the impact on the organization should some particular threat actually eventuate and is typically described qualitatively |
|
|
Term
|
Definition
| the probability that an identified threat could occur and cause harm to some asset and is also typically described qualitatively |
|
|