• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back

CISA

it's a good way to improve yourself

PKI

Public Key Infrastructure

EDI

Electronic Data Interchange

Postimplementation review

One key objective of postimplementation review is to evaluate the projected cost/benefits or the return on investments (ROI) measurements

Symmetric key

Là Mã hóa đối xứng, tức là key sử dụng cho cả encrypt và decrypt. Các sym key cơ bản: DES 56 bit (yếu nhất và hầu như đã bỏ), 3DES 168 bit, RC (Ron Code) /RC 4 128 bit/RC 5 64 bit/ RC 6 256 bit và AES 256 bit (mạnh nhất) hoặc Kerberos (hệ thống tạo ra sym key as ticket).


2 kiểu thuật toán sym key là stream cipher (encrypt on every bit) và block cipher (encrypt một nhóm nhiều bit).

Advanced Encryption Standard

Do viện NIST vào cuối thập niên 90. gồm 3 bản AES-128, AES-192, AES-256. Thuật toán này dựa trên block cipher là 128 bit, nhưng độ dài key là khác nhau. Ứng dụng của AES rất tốt trong mã hóa các ổ đĩa.



AES còn được sử dụng trong giao thức WPA2 và IEEE 802.11i

referential integrity

rang buoc toan ven
concerns the concept of a foreign key. the referential integrity rule states that any foreign-key value can only be one of two states. the usual states of affairs is that the foreign key value refers to a primary key value of some table in the databse. occasionally this will depend on the rules of the data owner, a foreign key value can be null, means no relationship between the objects represented in the database or this relationship is unknown
domain integrity
specifies that all columns in relational database must be declared upon a defined domain

relational integrity

is performed at the record level and is ensured by calculating and verifying specific fields

intrusion
IPS
IDS

intrusion prevention system la he thong ngan chan xam nhap
intrusion detection system la he thong phat hien xam nhap
perfect la ket hop ids va ips. ids dien hinh la snort. ips dien hinh la firewall

Table-top testing

is to practice proper coordination since it involves all or some of the crisis team members and is focused more on coordination and communications issues than on technical process details.

Functional testing in BCP

Functional testing involves mobilization of personnel and resources at various geographic sites.

Full-scale testing in BCP

Full-scale testing involves enterprisewide participation and full involvement of external organizations.

Non-repudation

Chống thoái thác (tiếng Anh: non-repudiation) là khái niệm nhằm đảm bảo một hợp đồng, đặc biệt là cái đã được thỏa thuận và đồng ý trên Internet, sau này không thể bị các bên tham gia từ chối được. Trong nền kinh tế toàn cầu hiện nay, khi việc thỏa thuận mặt đối mặt là những việc thường không thể thực hiện được, việc chống thoái thác trở thành hết sức quan trọng đối với thương mại.

Internal labeling, including file header records

Internal labeling, including file header records, is correct because it can provide assurance that proper data files are being used and it allows for automatic checking.

Parity checking

It is a data integrity validation method typically used by a data transfer program. may help to ensure that data and program files are transferred successfully, it does not help to ensure that the proper data or program files are being used.

File security controls

Cannot be used to provide assurance that proper data files are being used and cannot allow for automatic checking. They can be used to provide assurance that unauthorized users do not have access to the application and/or access to read or alter the data in an unauthorized manner.

CSA

CSA is the review of business objectives and internal controls in a formal and documented collaborative process. It includes testing the design of automated application controls. Exception reporting only looks at what has not been achieved.


Six basic methodologies for control self-assessment have been defined:

* Internal Control Questionnaire (ICQ) self-audit
* Customised questionnaires
* Control guides
* Interview techniques
* Control model workshops
* Interactive workshops

Packet switching

Packet switching is a sophisticated means of maximizing the transmission capacity of networks. Messages are broken down into packets and routed independently through the network, depending on the availability of a channel in a network. The transmission cost is by packet and not by message, route or distance. Sophisticated error and flow control procedures are applied to each link by the network. This helps in identifying errors in transmission. All of the other options do not offer error and flow control procedures.

Message switching

Message switching was the precursor of packet switching, where messages were routed in their entirety, one hop at a time. Message switching systems are nowadays mostly implemented over packet-switched or circuit-switched data networks. Each message is treated as a separate entity. Each message contains addressing information, and at each switch this information is read and the transfer path to the next switch is decided. Depending on network conditions, a conversation of several messages may not be transferred over the same path. Each message is stored (usually on hard drive due to RAM limitations) before being transmitted to the next switch. Because of this it is also known as a 'store-and-forward' network. Email is a common application for Message Switching. A delay in delivering email is allowed unlike real time data transfer between two computers.

Circuit switching

Circuit switching is a methodology of implementing a telecommunications network in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate.

virtual circuit

A virtual circuit (VC) is a means of transporting data over a packet switched computer network in such a way that it appears as though there is a dedicated physical layer link between the source and destination end systems of this data. The term virtual circuit is also synonymous withvirtual connection and virtual channel. Before a connection or virtual circuit may be used, it has to be established, between two or more nodesor software applications, by configuring the relevant parts of the interconnecting network. After which, a bit stream or byte stream may be delivered between the nodes; hence, a virtual circuit protocol allows higher level protocols to avoid dealing with the division of data intosegments, packets, or frames.


Virtual circuit communication resembles circuit switching, since both areconnection oriented, meaning that in both cases data is delivered in correct order, and signalling overhead is required during a connection establishment phase. However, circuit switching provides a constant bit rate and latency, while these may vary in a virtual circuit service due to factors such as:

* varying packet queue lengths in the network nodes,
* varying bit rate generated by the application,
* varying load from other users sharing the same network resources by means of statistical multiplexing, etc.

Many virtual circuit protocols, but not all, provide reliable communication service through the use of data retransmissions because of error detection and automatic repeat request (ARQ).

protocol

Tập hợp tất cả các quy tắc, quy ước để đảm bảo cho các máy tính trên
mạng có thể giao tiếp với nhau gọi là giao thức. Như vậy các máy trên mạng
muốn giao tiếp với nhau thì phải có chung một giao thức.


Các dạng liên kết:
_Giao thức hướng kết nối và giao thức không kết nối
(Connectionless & Connection- Oriented protocols)
_Giao thức có khả năng định tuyến và giao thức không có khả
năng định tuyến (Routable & non - Routable protocols)

Connectionless & Connection- Oriented protocols

•Đặc điểm của giao thức không kết nối:
a. Không kiểm soát đường truyền
b. Dữ liệu không bảo đảm đến được nơi nhận
c. Dữ liệu thường dưới dạng datagrams
Ví dụ: giao thức UDP của TCP/IP
•Đặc điểm của giao thức hướng kết nối:
a. Ngược lại với giao thức không kết nối , kiểm soát được đường
truyền
b. Dữ liệu truyền đi tuần tự, nếu nhận thành công thì nơi nhận phải
gởi tín hiệu ACK (ACKnowledge)
Ví dụ: các giao thức TCP, SPX

Routable & non - Routable protocols

Giao thức có khả năng định tuyến
Là các giao thức cho phép đi qua các thiết bị liên mạng như Router để
xây dựng các mạng lớn có qui mô lớn hơn
Ví dụ, các giao thức có khả năng định tuyến là: TCP/IP, SPX/IPX
Giao thức không có khả năng định tuyến
Ngược với giao thức có khả năng định tuyến, các giao thức này không
cho phép đi qua các thiết bị liên mạng như Router để xây dựng các mạng lớn.
Ví dụ về giao thức không có khả năng định tuyến là : NETBEUI

ARP

Address Resolution Protocol


ARP provides dynamic address mapping between an IP address and hardware address.

TCP

Transmission Control Protocol


TCP enables two hosts to establish a connection and exchange streams of data.

RIP

Routing Information Protocol


RIP specifies how routers exchange routing table information.

SOAP

Simple Object Access Protocol


SOAP is a platform-independent XML-based protocol, enabling applications to communicate with each other over the Internet, and does not deal with MAC addresses.

raid
redundant array of inexpensive disk
is data storage virtualization technology that combinea multiple disk drive componenta into logival unit for the purposes of data redundacy or performance improvement
raid 0 la dung 2 o dia de chay, du lieu duoc ghi deu ca 2 o -> tang toc ghi dia.
raid 1 la dung 2 o dia chay mirror -> mat 1 o thi o con lai hoat dong bt ma ko anh huong den data
raid 5 la dung it nhat 3 o dia. vua chay parralel va vua chay backup. 3 o 80gb thi net lai con 160 gb