Term
|
Definition
the sum of all threats facing the corporation |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
pieces of executable code that attach themselves to other programs. Within a computer, whenever an infected program runs (executes), the virus attaches itself to other programs |
|
|
Term
|
Definition
scan arriving files for viruses and other malware |
|
|
Term
|
Definition
|
|
Term
|
Definition
attack programs that propagate on their own by seeking out other computers, jumping to them, and installing themselves |
|
|
Term
|
Definition
worms that exploit vulnerability in software |
|
|
Term
|
Definition
a piece of code that can be executed by a virus or worm after it has spread to multiple machines (in war, when a bomber reaches its target, it releases its payload of bombs) |
|
|
Term
|
Definition
a program that looks like an ordinary system file, but continues to exploit the user indefinitely |
|
|
Term
|
Definition
that sits on a victim’s machine and gathers information about the victim |
|
|
Term
|
Definition
done without someone’s knowledge, such as surreptitious face recognition scanning |
|
|
Term
|
Definition
spyware that records your keystrokes, looking for passwords, social security numbers, and other information that can help the person who receives the keystroke logger’s data commit fraud |
|
|
Term
|
Definition
spyware that searches your hard drive for potentially useful information and sends it to the attacker |
|
|
Term
|
Definition
tricking people into doing something to get around security protections |
|
|
Term
|
Definition
unsolicited commercial e-mail |
|
|
Term
|
Definition
social engineering attack that uses an official-looking e-mail message or website |
|
|
Term
|
Definition
someone who steals credit card numbers |
|
|
Term
|
Definition
stealing enough information about a person to impersonate him or her in complex financial transactions |
|
|
Term
|
Definition
intentionally using a computer resource without authorization or in excess of authorization |
|
|
Term
|
Definition
to try to determine a network’s design through the use of probe packets |
|
|
Term
|
Definition
a packet sent into a firm’s network during scanning; responses to the probe packet tend to reveal information about a firm’s general network design and about its individual computers—including their operating systems |
|
|
Term
|
Definition
break-in program; a program that exploits known vulnerabilities |
|
|
Term
|
Definition
a security weakness found in software |
|
|
Term
|
Definition
a collection of tools which automate some tasks that the hacker will have to perform after the break-in |
|
|
Term
|
Definition
a way back into a compromised computer that an attacker leaves open; it may simply be a new account or a special program |
|
|
Term
|
Definition
the type of attack whose goal is to make a computer or a network unavailable to its users |
|
|
Term
|
Definition
DoS attack in which the victim is attacked by many computers |
|
|
Term
|
Definition
a type of malware that can be upgraded remotely by an attacker to fix errors or to give the malware additional functionality |
|
|
Term
|
Definition
someone who creates viruses |
|
|
Term
|
Definition
an attacker who possesses only modest skills but uses attack scripts created by experienced hackers; dangerous because there are so many |
|
|
Term
|
Definition
employee who is upset with the firm or an employee and who may take revenge through a computer attack |
|
|
Term
|
Definition
former employee who is upset with the firm or an employee and who may take revenge through a computer attack |
|
|
Term
|
Definition
an attacker who attacks with criminal motivation |
|
|
Term
|
Definition
a computer attack made by terrorists |
|
|
Term
|
Definition
a computer attack made by a national government |
|
|
Term
|
Definition
the process of balancing threats and protection costs |
|
|
Term
|
Definition
security in which all avenues of attack are closed off |
|
|
Term
|
Definition
determining who may access each resource |
|
|
Term
|
Definition
initially giving users only the permissions they absolutely need to do their jobs |
|
|
Term
|
Definition
the use of successive lines of defense to thwart attackers |
|
|
Term
|
Definition
plans for controlling access to a resource |
|
|
Term
|
Definition
the requirement that someone who requests to use a resource must prove his or her identity |
|
|
Term
|
Definition
permitting a person or program to take certain actions on a resource |
|
|
Term
|
Definition
collecting data about events to assess actions after the fact |
|
|
Term
|
Definition
in authentication, the party trying to prove its identity to the verifier |
|
|
Term
|
Definition
the party requiring the applicant to prove his or her identity |
|
|
Term
|
Definition
proof of identity that an applicant can present during authentication |
|
|
Term
|
Definition
use of a central authentication server helps provide consistent security by ensuring that all verifiers check credentials against the same authentication information |
|
|
Term
|
Definition
a secret keyboard string only the account holder should know; authenticates user access to an account |
|
|
Term
|
Definition
an alias that signifies the account that the account holder will be using |
|
|
Term
|
Definition
a common word, dangerous to use for a password because it is easily cracked |
|
|
Term
|
Definition
|
|
Term
|
Definition
a password-cracking attack in which an attacker tries to break a password by trying all words in a standard or customized dictionary |
|
|
Term
|
Definition
password cracking, a mode that tries variations on common word passwords |
|
|
Term
|
Definition
a password-cracking attack in which an attacker tries to break a password by trying all possible combinations of characters |
|
|
Term
|
Definition
passwords should be at least eight characters long, and even longer passwords are highly desirable |
|
|
Term
|
Definition
a document that gives the name of a true party, that true party’s public key, and other information; used in authentication |
|
|
Term
Digital certificate authentication |
|
Definition
authentication in which each user has a public key and a private key. Authentication depends on the applicant knowing the true party’s private key; requires a digital certificate to give the true party’s public key |
|
|
Term
|
Definition
a key that is not kept secret. Part of a public key-private key pair |
|
|
Term
|
Definition
a key that only the true party should know. Part of a public key-private key pair |
|
|
Term
Public key authentication |
|
Definition
authentication in which each user has a public key and a private key. Authentication depends on the applicant knowing the true party’s private key; requires a digital certificate to give the true party’s public key |
|
|
Term
Public key infrastructures |
|
Definition
a total system (infrastructure) for public key encryption |
|
|
Term
|
Definition
the use of bodily measurements to identify an applicant |
|
|
Term
|
Definition
a form of biometric authentication that uses the applicant’s fingerprints |
|
|
Term
|
Definition
in biometrics, the normal rate of misidentification when the subject is cooperating |
|
|
Term
|
Definition
a form of biometric authentication that uses the colored part of the eye (iris) |
|
|
Term
|
Definition
the scanning of passerby to identify terrorists or wanted criminals by the characteristics of their faces |
|
|
Term
|
Definition
a security system that examines each incoming packet. If the firewall identifies the packet as an attack packet, the firewall discards the packet and copies information about the discarded packet into a log file |
|
|
Term
|
Definition
a packet that is provably an attack packet |
|
|
Term
|
Definition
file containing information about packets discarded by a firewall |
|
|
Term
|
Definition
the filtering of traffic coming into a site from the outside |
|
|
Term
|
Definition
the filtering of traffic from inside a site going out |
|
|
Term
Stateful firewall filtering |
|
Definition
a firewall whose default behavior is to allow all connections initiated by internal hosts but to block all connections initiated by external hosts. Only passes packets that are part of approved connections |
|
|
Term
Access control lists (ACLs) |
|
Definition
an ordered list of pass/deny rules for a firewall or other device |
|
|
Term
Intrusion Detection Systems (IDSs) |
|
Definition
a security system that examines messages traveling through a network. IDSs look at traffic broadly, identifying messages that are suspicious. Instead of discarding these packets, IDSs will sound an alarm |
|
|
Term
|
Definition
a false alarm; an apparent incident that proves not to be an attack |
|
|
Term
Intrusion Prevention Systems (IPSs) |
|
Definition
firewall system that uses sophisticated packet filtering methods to stop attacks |
|
|
Term
|
Definition
the examination of headers and messages at multiple layers in a packet |
|
|
Term
|
Definition
a security system that automatically provides a mix of security protections, usually including confidentiality, authentication, message integrity, and replay protection |
|
|
Term
|
Definition
to mathematically process a message so that an interceptor cannot read the message |
|
|
Term
|
Definition
assurance that interceptors cannot read transmissions |
|
|
Term
|
Definition
term for encryption methods |
|
|
Term
|
Definition
conversion of encrypted ciphertext into the original plaintext so an authorized receiver can read an encrypted message |
|
|
Term
|
Definition
family of encryption methods in which the two sides use the same key to encrypt messages to each other and to decrypt incoming messages. In bidirectional communication, only a single key is used |
|
|
Term
|
Definition
cracking a key or password by trying all possible keys or passwords |
|
|
Term
|
Definition
a bit string added to a message to provide message-by-message authentication and message integrity |
|
|
Term
|
Definition
a calculation added to a plaintext message to authenticate it |
|
|
Term
Key-hashed Message Authentication Codes (HMACs) |
|
Definition
electronic signature technology that is efficient and inexpensive but lacks non-repudiation |
|
|
Term
|
Definition
set up to protect itself, as a server or client |
|
|
Term
Group Policy Objects (GPOs) |
|
Definition
policies that govern specific types of resources on a domain |
|
|
Term
|
Definition
testing after protections have been configure, in which a company or consultant attacks protections in the way a determined attacker would and notes which attacks that should have been stopped actually succeeded |
|
|
Term
|
Definition
the collection of data in a form acceptable for presentation in a legal proceeding |
|
|
Term
Computer Security Incident Response Team (CSIRT) |
|
Definition
a team convened to handle major security incidents, made up of the firm’s security staff, members of the IT staff, and members of functional departments, including the firm’s legal department |
|
|
Term
|
Definition
recovering from a disaster that damages computer equipment or data |
|
|