Security and Cryptography Vocabulary

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/132

flashcard set

Earn XP

Description and Tags

Flashcards about Core Security Concepts, Cybersecurity, and Cryptography

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

133 Terms

1
New cards

Information Security

Defined by the information being protected from unauthorized access or alteration and yet is available to authorized individuals when required.

2
New cards

Information Assurance (IA)

A term used to describe not just the protection of information but a means of knowing the level of protection that has been accomplished. It involves assuring information andmanaging risks related to the use, processing, storage and transmission of information.

3
New cards

Hacker

Individuals who attempt to gain unauthorized access to computer systems or networks.

4
New cards

Phreaking

The hacking of the systems and computers used by a telephone company to operate its telephone network.

5
New cards

Confidentiality

Ensures that only those individuals who have the authority to view a piece of information may do so.

6
New cards

Integrity

Deals with the generation and modification of data; only authorized individuals should ever be able to create, change, or delete information.

7
New cards

Availability

Ensures that the data, or the system itself, is available for use when the authorized user wants it.

8
New cards

Authentication

Attempts to ensure that an individual is who they claim to be.

9
New cards

Nonrepudiation

Deals with the ability to verify that a message has been sent and received and that the sender can be identified and verified.

10
New cards

Auditability

Refers to whether a control can be verified to be functioning properly.

11
New cards

NIST Cybersecurity Framework Model core functions

Identify, protect, detect, respond and recover.

12
New cards

Session Management

A set of activities employed to establish a communication channel between two parties.

13
New cards

Exception Management

The management of changes to normal processing; an important consideration during software development.

14
New cards

Configuration Management

Involves the design and operation of elements to ensure the proper functional environment of a system.

15
New cards

Host security

Takes a granular view and focuses on protecting each computer and device individually.

16
New cards

Network Security

Emphasis is placed on controlling access to internal computers from external entities.

17
New cards

Least privilege

A subject should have only the necessary rights and privileges to perform its task with no additional permissions.

18
New cards

Separation of privilege

A protection mechanism should be constructed so that it uses more than one piece of information to make access decisions.

19
New cards

Separation of duties

The application of separation of privilege to the people side of the security function.

20
New cards

Fail-safe defaults

When something fails, it should do so to a safe state.

21
New cards

Default deny (Implicit deny)

Deny access by default, and grant access only when explicit permission exists.

22
New cards

Economy of mechanism

Always using simple solutions when available.

23
New cards

Complete mediation

Each and every request should be verified.

24
New cards

Open design

The protection of an object should not rely upon secrecy of the protection mechanism itself.

25
New cards

Kerckhoff’s Principle

A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.

26
New cards

Security through obscurity

Protecting something by hiding it or using secrecy of design/implementation; considered a poor approach.

27
New cards

Least common mechanism

Mechanisms used to access resources should be dedicated and not shared.

28
New cards

Psychological acceptability

Refers to the users’ acceptance of security measures. If security measures are perceived as an impediment, users may bypass them.

29
New cards

Defense in depth (layered security)

The use of multiple, different defense mechanisms with a goal of improving the defensive response to an attack.

30
New cards

Diversity of defense

Involves making different layers of security dissimilar.

31
New cards

Access Control

The ability to control whether a subject can interact with an object.

32
New cards

Authentication

Deals with verifying the identity of a subject.

33
New cards

Authentication Factors

Something you know, something you have, something about you.

34
New cards

Group Policy

Defines applicable operating system and application settings and permissions for a group.

35
New cards

Password Policy

Addresses procedures for selecting user passwords, frequency of changes, and distribution.

36
New cards

Bell-LaPadula security model

Addresses data confidentiality in computer operating systems with “no read up, no write down” principles.

37
New cards

Brewer-Nash security model (Chinese Wall model)

Defined by controlling read and write access based on conflict of interest rules.

38
New cards

Biba security model

Protects integrity with “no write up, no read down” principles.

39
New cards

Clark-Wilson security model

Uses well-formed transactions as a basis for rules.

40
New cards

Policies

High-level, broad statements of what the organization wants to accomplish.

41
New cards

Procedures

Step-by-step instructions on how to implement policies in the organization.

42
New cards

Standards

Mandatory elements regarding the implementation of a policy.

43
New cards

Guidelines

Recommendations relating to a policy; they are not mandatory steps.

44
New cards

Security Policy

A high-level statement produced by senior management that outlines what security means to the organization and its goals for security.

45
New cards

Change Management Policy

Ensures proper procedures are followed when modifications to the IT infrastructure are made.

46
New cards

Data ownership

A business function responsible for establishing requirements for security, privacy, and retention of data.

47
New cards

Data backup

Ensures that adequate backups occur; is an important security element.

48
New cards

Classification of information

Needed due to different importance or sensitivity of information. Examples include Confidential, Secret, Top Secret, Publicly Releasable, Proprietary, Company Confidential, and For Internal Use Only.

49
New cards

Need to know

Each individual is supplied the absolute minimum amount of information and privileges needed to perform work; access requires justified need to know.

50
New cards

Disposal and destruction policy

Prescribes secure disposal and destruction of sensitive data, including shredding papers and securely deleting or degaussing magnetic storage.

51
New cards

Code of ethics

Describes expected behavior at the highest level, demanding honesty, professionalism, and addressing privacy/confidentiality and conflicts of interest.

52
New cards

Job rotation and mandatory vacations

Security protection mechanism and tool to detect fraud through cross-training and free audits.

53
New cards

Employee hiring/promotions & Business partner relationships

Policies should ensure the organization hires the most capable and trustworthy employees and address on-boarding/off-boarding processes for business partners.

54
New cards

Acceptable Use Policy (AUP)

Outlines what the organization considers to be the appropriate use of company resources, such as computer systems, e-mail, Internet access, and networks.

55
New cards

Internet Usage Policy

Goal is to ensure maximum employee productivity and to limit potential liability from inappropriate Internet use.

56
New cards

E-mail Usage Policy

Specifies what the company allows employees to send and reminds employees of the risks of clicking on links in e-mails or opening attachments.

57
New cards

Clean desk policy

Specifies that sensitive information must not be left unsecured in the work area when the worker is not present.

58
New cards

Bring Your Own Device (BYOD) policy

Primary purpose is to lower risk associated with connecting personal devices to a company’s network, with security as its center element.

59
New cards

Privacy policy

Explains guiding principles in guarding personal data.

60
New cards

Personally Identifiable Information (PII)

Includes any data that can be used to uniquely identify an individual. Examples: Name, address, driver’s license number, and other details.

61
New cards

Due Care

Generally refers to the standard of care a reasonable person is expected to exercise in all situations.

62
New cards

Due Diligence

Generally refers to the standard of care a business is expected to exercise in preparation for a business transaction.

63
New cards

Due Process

Concerned with guaranteeing fundamental fairness, justice, and liberty in relation to an individual’s legal rights.

64
New cards

Incident Response Policy

Developed to outline how the organization will prepare for and respond to security incidents, covering preparation, detection, containment, recovery, and follow-up.

65
New cards

Security Awareness and Training

Enhance an organization’s security posture by teaching personnel how to follow correct actions and make them aware of social engineering attacks.

66
New cards

Role-based Training

Training needs to be targeted to the user with regard to their role.

67
New cards

Compliance

Organizations must build laws, regulations, contractual requirements, standards, and best practices into their own policies and procedures.

68
New cards

User Habits

A front-line security tool that engages the workforce to improve the overall security posture.

69
New cards

Training Metrics and Compliance

Requires a record-keeping system measuring compliance with attendance and the effectiveness of the training.

70
New cards

Interoperability Agreements

Written agreements used to ensure agreement is understood between the parties.

71
New cards

Service Level Agreements (SLA)

Contractual agreements between entities that describe specified levels of service.

72
New cards

Business Partnership Agreement (BPA)

Legal agreement between partners establishing the terms, conditions, and expectations of the relationship.

73
New cards

Memorandum of Understanding (MOU)

Written agreement expressing a set of intended actions that generally lacks the binding powers of a contract.

74
New cards

Interconnection Security Agreement (ISA)

Specialized agreement between organizations that have interconnected IT systems to document the security requirements.

75
New cards

Physical Security

All mechanisms used to ensure that physical access to the computer systems and networks is restricted to only authorized users.

76
New cards

Man Trap

A small space large enough for only one person at a time, with two locking doors.

77
New cards

Surge protectors and Uninterruptible Power Supply (UPS)

Protects sensitive electronic equipment from momentary surges and disruptions; a UPS should be considered for critical systems.

78
New cards

Fire Suppression

Includes detectors to identify fires early and suppression systems (e.g., standard sprinklers, gas-based systems).

79
New cards

Van Eck phenomenon

Eavesdropping on monitor displays by decoding the electromagnetic interference produced by the monitors.

80
New cards

TEMPEST

Military program to control electronic emanations susceptible to eavesdropping.

81
New cards

Prevention Methods against Electromagnetic Eavesdropping

distance, shielding, and Faraday cage

82
New cards

Social Engineering

The process of convincing an authorized individual to provide confidential information or access.

83
New cards

Ego or Vanity Attack

Exploits a victim's desire to be seen as intelligent or knowledgeable.

84
New cards

Sympathy Attack

Attacker pretends to be in a real jam and needs assistance to get tasks done immediately.

85
New cards

Intimidation Attack

Attacker pretends to be an authoritative figure, an influential person in the organization, or law enforcement.

86
New cards

Phishing

Attacker attempts to obtain sensitive information by masquerading as a trusted entity in an e-mail or instant message.

87
New cards

Spear Phishing

Special targeting of groups with something in common, typically via email.

88
New cards

Pharming

Misdirecting users to fake web sites made to look official.

89
New cards

Smishing

SMS phishing.

90
New cards

Advanced Persistent Threat (APT)

A method of attack focusing on stealth and continuous presence on a system, often using phishing for initial entry.

91
New cards

Vishing

A variation of phishing that uses voice communication technology.

92
New cards

SPAM

Bulk unsolicited e-mail; malicious versions include attachments with malware or links to malicious web sites.

93
New cards

SPIM

SPAM delivered via instant messaging application.

94
New cards

Shoulder surfing

Attacker observes individual entering sensitive information on a form, keypad, or keyboard.

95
New cards

Reverse social engineering

Occurs when the attacker hopes to convince the target to initiate the contact.

96
New cards

Hoaxes

Can be very damaging if it causes users to take some sort of action that weakens security; training and awareness are the best defense.

97
New cards

Tailgating or Piggybacking

Following closely behind a person who has just used his own access card or PIN to gain physical access.

98
New cards

Dumpster diving

Going through a target’s trash in hopes of finding valuable information.

99
New cards

Backdoor

An avenue used to access a system while circumventing normal security mechanisms.

100
New cards

Data handling

Employees need training on how to recognize data classification and handling requirements and how to follow the proper handling processes.