Usable Sec Midterm Reviewer

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/173

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

174 Terms

1
New cards

Risk management

The process of identifying, assessing, and reducing risks facing an organization.

2
New cards

Risk identification

The enumeration and documentation of risks to an organization’s information assets.

3
New cards

Risk control

The application of controls that reduce the risks to an organization’s assets to an acceptable level.

4
New cards

Risk appetite

The quantity and nature of risk that organizations are willing to accept as trade-offs between perfect security and unlimited accessibility.

5
New cards

Residual risk

The risk that has not been completely removed, shifted, or planned for.

6
New cards

Threat assessment

The process that identifies and quantifies the risks facing each asset.

7
New cards

Vulnerability

Specific avenues threat agents can exploit to attack an information asset.

8
New cards

Risk assessment

Evaluates the relative risk for each vulnerability by assigning a risk rating or score.

9
New cards

Loss frequency

An assessment of the likelihood of an attack combined with the expected probability of success.

10
New cards

Loss magnitude (asset exposure)

The amount of an information asset that could be lost in a successful attack.

11
New cards

Annualized Loss Expectancy (ALE)

The expected loss per risk per year.

12
New cards

ALE formula: ALE = Single Loss Expectancy (SLE) × Annualized Rate of Occurrence (ARO)

13
New cards

Single Loss Expectancy (SLE)

The cost of a single loss event.

14
New cards

SLE formula: SLE = Asset Value × Exposure Factor (EF)

15
New cards

Annualized Rate of Occurrence (ARO)

Estimated frequency with which a threat is expected to occur within a year.

16
New cards

Cost-Benefit Analysis (CBA)

Determines if an alternative being evaluated is worth the cost to control the vulnerability.

17
New cards

CBA formula: CBA = ALE(prior) – ALE(post) – ACS (Annualized Cost of Safeguard)

18
New cards

Defense

A risk control strategy that attempts to prevent exploitation of the vulnerability.

19
New cards

Transfer

A risk control strategy that shifts risk to other assets, processes, or organizations.

20
New cards

Mitigate

A risk control strategy that reduces the impact of an attack rather than its likelihood.

21
New cards

Acceptance

A risk control strategy where the organization accepts the outcome of a vulnerability being exploited.

22
New cards

Termination

A risk control strategy that involves discontinuing the activity introducing uncontrollable risk.

23
New cards

Quantitative assessment

Risk control practices that use actual numerical values or estimates.

24
New cards

Qualitative assessment

Risk control practices using non-numerical measures or characteristics.

25
New cards

Benchmarking

The process of seeking out and studying practices in other organizations to duplicate them.

26
New cards

Metrics-based measures

Benchmarking measures based on numerical standards.

27
New cards

Process-based measures

Benchmarking measures that are strategic and less focused on numbers.

28
New cards

Standard of due care

Demonstrating that an organization has taken reasonable measures to protect information assets.

29
New cards

Due diligence

Ongoing effort to maintain proper security controls and standards over time.

30
New cards

Best business practices

Security efforts that provide a superior level of information protection.

31
New cards

Baselining

Comparison of past security activities and events against future performance.

32
New cards

Organizational feasibility

Assesses how well IS alternatives contribute to organizational goals.

33
New cards

Operational feasibility

Assesses user/management acceptance and stakeholder requirements.

34
New cards

Technical feasibility

Assesses if the organization can implement/support the proposed controls.

35
New cards

Political feasibility

Defines what can/cannot occur based on consensus among stakeholders.

36
New cards

Access control

Method by which systems determine whether and how to admit a user into a trusted area of the organization.

37
New cards

Mandatory access controls (MACs)

Use data classification schemes to enforce access rules.

38
New cards

Discretionary access controls (DACs)

Allow users to control access to resources they own.

39
New cards

Nondiscretionary controls

Strictly enforced version of MACs managed by a central authority.

40
New cards

Identification

Mechanism where unverified entities provide a label by which they are known to the system.

41
New cards

Authentication

Process of validating a supplicant’s identity.

42
New cards

Password

A private word or character combination known only to the user.

43
New cards

Passphrase

A longer series of characters used to derive a virtual password.

44
New cards

Dumb card

ID or ATM card with a magnetic stripe.

45
New cards

Smart card

Contains a chip that verifies and validates user information.

46
New cards

Synchronous token

Generates login codes based on time synchronization.

47
New cards

Asynchronous token

Generates login codes in response to a challenge.

48
New cards

Biometrics

Uses measurable human traits to authenticate identity.

49
New cards

Authorization

Matching of an authenticated entity to information assets and access levels.

50
New cards

Authorization tickets

Tokens used to grant access to resources.

51
New cards

Accountability (Auditability)

Ensures actions on a system can be traced to an authenticated identity.

52
New cards

Trusted computing base (TCB)

Enforces system security policy; part of TCSEC Rainbow Series.

53
New cards

Storage channels

Covert channels based on system storage mechanisms.

54
New cards

Timing channels

Covert channels based on system timing.

55
New cards

ITSEC

International criteria for evaluating computer system security.

56
New cards

The Common Criteria

Successor to TCSEC and ITSEC for evaluating IT security.

57
New cards

Bell-LaPadula Model

Confidentiality model based on access control.

58
New cards

Biba Integrity Model

Prevents “write up” and “read down” to preserve data integrity.

59
New cards

Clark-Wilson Integrity Model

Ensures no unauthorized changes to data or programs.

60
New cards

Graham-Denning Model

Access control model using objects, subjects, and rights.

61
New cards

Harrison-Ruzzo-Ullman Model

Defines method to manage access rights and subjects/objects.

62
New cards

Brewer-Nash Model (Chinese Wall)

Prevents conflicts of interest in access control.

63
New cards

Firewall

Device or software that prevents unauthorized data transfer between networks.

64
New cards

Packet filtering

Examines packet headers to allow or deny data based on IPs and ports.

65
New cards

Application gateways

Proxy firewalls operating at the application layer.

66
New cards

Circuit gateways

Manage connections based on session information.

67
New cards

MAC layer firewalls

Filter traffic based on MAC addresses at data link layer.

68
New cards

Hybrid firewalls

Combine features from multiple types of firewalls.

69
New cards

Static filtering

Uses fixed rules for filtering traffic.

70
New cards

Dynamic filtering

Updates filtering rules in response to events.

71
New cards

Stateful inspection

Tracks active connections using a state table.

72
New cards

Application layer firewall (proxy server)

Filters application-specific traffic; often in DMZ.

73
New cards

Packet-filtering router

Router that filters traffic based on header information.

74
New cards

Bastion host

Dual-homed firewall with two NICs acting as a network defender.

75
New cards

Screened host firewall

Combines packet filtering and proxy servers for double-layered protection.

76
New cards

Screened subnet firewall (with DMZ)

Uses multiple bastion hosts and routers to create a DMZ.

77
New cards

SOCKS server

Circuit-level proxy using the SOCKS protocol to handle TCP traffic.

78
New cards

Firewall rules

Logical conditions used by firewalls to allow or block traffic.

79
New cards

Content filter

Software that restricts access to specific web content or protocols.

80
New cards

War dialer

Automated tool that scans phone numbers for modem connections.

81
New cards

RADIUS

Central server for authenticating user credentials remotely.

82
New cards

Diameter

Advanced alternative to RADIUS for authentication.

83
New cards

TACACS

Centralized access control system validating credentials.

84
New cards

Kerberos

Secure third-party authentication using symmetric encryption.

85
New cards

Authentication server (AS)

First component in Kerberos for initial validation.

86
New cards

Key Distribution Center (KDC)

Issues keys for secure communications in Kerberos.

87
New cards

Ticket Granting Service (TGS)

Issues service tickets in Kerberos.

88
New cards

SESAME

European authentication system using public key encryption and privilege certificates.

89
New cards

Virtual Private Network (VPN)

Secure connection over a public network.

90
New cards

Trusted VPN

Uses leased lines; relies on trust between partners.

91
New cards

Secure VPN

Uses encrypted tunnels over public networks.

92
New cards

Hybrid VPN

Combines trusted and secure VPN technologies.

93
New cards

Encapsulation

Wrapping data into a secure format for transmission.

94
New cards

Encryption

Converts data into an unreadable format for unauthorized users.

95
New cards

Transport mode

Encrypts data within IP packet, not the header.

96
New cards

Tunnel mode

Encrypts the entire packet for secure tunneling between servers.

97
New cards

Microsoft ISA Server

Example of tunnel-mode VPN server.

98
New cards

Intrusion Detection System (IDS)

A security tool that monitors network or system activities for malicious actions or policy violations.

99
New cards

Network-based Intrusion Detection System (NIDS)

An IDS that monitors network traffic for suspicious activity across the entire network.

100
New cards

Host-based Intrusion Detection System (HIDS)

An IDS that monitors and analyzes the internals of a computing system rather than the traffic on its network.