click below
click below
Normal Size Small Size show me how
CIT292 Ch 10 and 11
CIT292 Network Security Terms for Chapters 10 and 11
Term | Definition |
---|---|
Access Control Model | methodologies in which admission to physical areas and more important computer systems, is managed and organized |
Discretionary access control (DAC) | An access control policy generally determined by the owner |
Trusted Computer System Evaluation Criteria (TCSEC) | A DoD standard that sets basic requirements for assessing the effectiveness of computer security access policies. Also known as the Orange Book |
Mandatory access control (MAC) | An access control policy determined by a computer system, not by a user or owner as it is in DAC |
Role-based access control (RBAC) | An access model that works with sets of permissions instead of individual permissions that are label based. Roles are created for various job function in an organization |
Implicit deny | denies all traffic to a resource unless the users generating that traffic are specifically granted access to the resource |
Job rotation | When users are cycled through various assignments |
Separation of Duties (SoD) | When more than one person is required to complete a particular task or operation |
Least privilege | When a user is given only the amount of privileges needed to do his job |
Account expiration | The date when users’ accounts they use to log on to the network expires |
Permissions | File system permissions control what resources a person can access on the network |
Time-of-day restriction | When a user’s logon hours are configured to restrict access to the network during certain times of the day and week. |
Access control list (ACL) | A list of permissions attached to an object. Specify level of access a user, users, group have to an object. When dealing with firewall, rules that apply to networks, IP addresses, or ports to permit or deny traffic. |
Policy | Rules or guidelines used to guide decisions and achieve outcomes. They can be written or configured on a computer |
Vulnerability | Weakness in your computer network design and individual host configuration |
Risk | The possibility of a malicious attack or other threat causing damage or downtime to a computer system |
Risk management | The identification, assessment,, and prioritization of risks, and the mitigating and monitoring of those risks. |
Information assurance (IA) | The practice of managing risks that are related to computer hardware and software systems |
Residual risk | The risk that is left after a security and disaster recovery plan has been implemented |
Risk assessment | The attempt to determine the amount of threats that could possibly occur in a given amount of time to your computers and networks |
Qualitative risk assessment | Assessment that assigns numeric values to the probability of a risk and the impact it can have on the system or network |
Quantitative risk assessment | Assessment that measures risk by using exact monetary values |
Risk mitigation | When risk is reduced or eliminated altogether |
Risk transference | The transfer or outsourcing of risk to a third party. Also known as risk sharing |
Risk avoidance | When an organization avoids risk because the risk factor is too great |
Risk reduction | When an organization mitigates risk to an acceptable level |
Risk acceptance | The amount of risk an organization is will to accept. Also known as risk retention |
Vulnerability management | The practice of finding and mitigating software vulnerabilities in computers and networks |
Vulnerability assessment | Baselining of the network to access the current security state of computers, servers, network devices, and the entire network in general |
Penetration testing | A method of evaluating the security of a system by simulating one or more attacks on that system |
Open Vulnerability and Assessment Language (OVAL) | A standard and a programming language designed to standardize the transfer of secure public information across networks and the Internet utilizing any security tools and services available |
Network mapping | The study of physical and logical connectivity of networks |
Vulnerability scanning | The act of scanning for weaknesses and susceptibilities in the network and on individual systems. |
Port scanner | Software used to decipher which ports are open on a host |
Protocol analyzer | Software tool used to capture and analyze packets |
Password cracker | Software tool used to recover passwords from hosts or to discover weak passwords |
Dictionary attack | A password attack that uses a prearranged list of likely word, trying each of them one at a time |
Brute force attack | A password attack where every possible password is attempted |
Cryptanalysis attack | A password attack uses a considerable set of precalculated encrypted passwords located in a lookup table |
Rainbow tables | In password cracking, a set of precalculated encrypted passwords located in a lookup table |
Salting | Randomization of the hashing process to defend against cryptanalysis password attacks and rainbow tables |