Term
Acceptable use policy(AUP) |
|
Definition
Rules that were made by the transit networks to restrict the use to which network may be put |
|
|
Term
|
Definition
Suitable or ready for use or service |
|
|
Term
|
Definition
noting or using a persons unique physical and other traits for the purpose of identification and security |
|
|
Term
|
Definition
a brand of smartphone used for wireless e-mail |
|
|
Term
|
Definition
identifies an organizations exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization |
|
|
Term
Certified information system security professional(CISSP) |
|
Definition
independent information security certification governed by International Information Systems Security Certification Consortium also known as (ISC)². (ISC)² is a self-declared non-profit organization,[1] but is not a charitable organization under the applicable Internal Revenue Service's code. |
|
|
Term
Childrens internet protection ACT (CIPA) |
|
Definition
The Children's Internet Protection Act (CIPA) requires that K-12 schools and libraries in the United States use Internet filters and implement other measures to protect children from harmful online content as a condition for the receipt of certain federal funding |
|
|
Term
|
Definition
Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. |
|
|
Term
|
Definition
is information a sender wishes to transmit to a receiver. Cleartext is often used as a synonym. |
|
|
Term
|
Definition
Confidentiality of information, enforced in an adaptation of the military's classic "need to know" principle with both positive and negative consequences. |
|
|
Term
|
Definition
is the technique whereby content is blocked or allowed based on analysis of its content, rather than its source or other criteria. |
|
|
Term
|
Definition
is the result of encryption performed on plaintext using an algorithm, called a cipher. |
|
|
Term
|
Definition
protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. |
|
|
Term
|
Definition
is the electronic medium of computer networks, in which online communication takes place |
|
|
Term
|
Definition
is an area, usually the frontier or boundary between two or more military powers (or alliances), where military activity is not permitted, usually by peace treaty, armistice, or other bilateral or multilateral agreement. |
|
|
Term
Disaster recovery plan (DRP) |
|
Definition
is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. |
|
|
Term
|
Definition
used to refer to periods when a system is unavailable |
|
|
Term
|
Definition
refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks |
|
|
Term
Network interface card(NIC) |
|
Definition
this is the physical between a computer and the ethernet LAN. It contains a unique 6-byte MAC-layer address. |
|
|
Term
|
Definition
software encryption keys used for encrypting and decrypting keys. |
|
|
Term
Network operations center(NOC) |
|
Definition
the command control center for a telecommunications service provider's backbone network and customer networks. customer trouble calls are answered by the NOC in support of managed services and SLAs. |
|
|
Term
Personal data assistant(PDA) |
|
Definition
a handheld device that acts as a mobile computer device supporting cell phone, Internet browsing, and e-mail. |
|
|
Term
|
Definition
stands for "packet internet groper." Ping uses the internet control message protocol(icmp) echo-request and echo-reply communications to verify end-to-end IP connectivity |
|
|
Term
|
Definition
A list of rules and methods for communicating. |
|
|
Term
|
Definition
A server that is placed on a DMZ LAN that acts as a middleman for data sharing between the outside world and a user. proxy servers assume risk, threats, and vulnerabilities so that the workstations they're connected to don't have to. |
|
|
Term
Recovery time objective(RTO) |
|
Definition
a defined metric for how long it must take to recover an IT system, application, and data access. |
|
|
Term
RFC 1087: Ethnics and the internet |
|
Definition
an acceptable use policy statement as issued by the internet advisory board and the US gov't defining ethics and the internet. |
|
|
Term
|
Definition
the likelihood that something bad will happen to an asset. |
|
|
Term
|
Definition
A U.S. federal law requiring officers of publicly traded companies to have accurate and audited financial statements. SOX also requires proper security controls to protect financial records and insider information. |
|
|
Term
Second-level authentication |
|
Definition
A second authentication requirement for users to gain access to more sensitive applications and data. |
|
|
Term
Secure Sockets Layer virtual private network(SSL-VPN) |
|
Definition
SSL-VPN is a means of securing remote access to a secure Website. In other words, it's a VPN that runs on secure sockets layer and encrypts communication to a secure Web server via a secure browser connection. |
|
|
Term
Service level agreement(SLA) |
|
Definition
a contractual commitment by a service provider or support organization to its customers or users. |
|
|
Term
Simple network management prototcol(SNMP) |
|
Definition
a non-secure connectionless UDP-based protocol that is used to transmit network -management data between IP devices and an SNMP network manager. |
|
|
Term
|
Definition
a cellphone that runs mobile communications software and supports voice, Internet browsing, e-mail, and text messaging. |
|
|
Term
|
Definition
An error or bug in software codea that can be exploited |
|
|
Term
|
Definition
the complement to an IP address that defines the IP network number and IP host address. |
|
|
Term
Systems seurity certified practioner(SSCP) |
|
Definition
a practitioner-level information systems security professional certification offered by (ISC)^2 |
|
|
Term
|
Definition
A non-secure application that supports remote terminal access in cleartext transmission. |
|
|
Term
|
Definition
Any action that could damage an asset. |
|
|
Term
|
Definition
A physical device that trnsmits a secret code to a user to authenticate the user. Can be a hardware-device token or a software generated token. |
|
|
Term
Transmission Control Protocol/Internet Protocol(TCP/IP) |
|
Definition
a popular suite of protocol that operate at both the Network and Transport layers of the OSI reference model. TCP/IP governs all activity across the internet and through most corporate and home networks. |
|
|
Term
Trivial File Transfer Protocol(TFTP) |
|
Definition
a connectionless, UDP-based file-transfer protocol used for quick and small file transfers between two IP devices. |
|
|
Term
|
Definition
A malicious software code that appears benign to the user but actually performs a task on behalf of a perpetrator with malicious intent. |
|
|
Term
|
Definition
The total amount of time the IT system application and data was accessible. |
|
|
Term
|
Definition
the broadast domain in Ethernet where all workstations are on the same logical LAN. |
|
|
Term
|
Definition
A software program that attaches itself to or copies itself into another program for the purpose of causing the computer to follow instructions that were not intended by the original program developer (infection) |
|
|
Term
|
Definition
A weakness that allows a threat to be realized or to have an asset. |
|
|
Term
|
Definition
a software review that identifies bugs or errors in software. |
|
|
Term
|
Definition
The gap in time between when a software vendor releases a software or security patch and when you implement it. |
|
|
Term
Wireless Access Point(WAP) |
|
Definition
A radio transceiver device that transmits and recieves IP communications via LAN technology |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|