• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back

DAC Discretionary Access Control (DAC)

Allows owners of data to specify what users can access data used most. Access control is based on discretion of data owners. Most common model. Users themselves can assign access to their own data.

Role Based Access Control (RBAC):

( also called Non-discretionary access control ) Centrally controlled model allows access based on the role the user holds in the organization; often hierarchical. Access is given to a group of users that perform a similar function. Based on the separation of duties.

Lattice Based Access Control

a security access methodology that assigns access permissions to both users and objects, creating a grid or lattice layout. A user cannot access an object with a security level greater that his/her own on the lattice.

Crossover Error Rate (CER)

the point at which the false rejection rate equals the false positive rate (this is repeated under biometrics)

The False Rejection Rate (FRR)

consists of the percentage of cases in which a valid user is incorrectly rejected by the system. This type of mistake is known as a Type I error.

False Acceptance Rate (FAR)

consists of the percentage of cases in which an invalid user is incorrectly accepted by the system. This type of mistake is known as a Type II error.

TCO
Total Cost of Ownershiph
ROI
Return on Investmenthiph

The Annualized Loss Expectancy (ALE)




ALE = SLE * ARO

is the expected monetary loss that can be expected for an asset due to a risk over a one year period

Exposure Factor The Exposure Factor (EF) is the percentage of value an asset lost due to an incident

the percentage of value an asset lost due to an incident

Single Loss Expectancy (SLE)



the cost of a single loss



Asset Value (AV) times the Exposure Factor (EF)

Annual Rate of Occurrence

the number of losses you suffer per year

Annualized Loss Expectancy (ALE)

is your yearly cost due to a risk. It is calculated by multiplying the Single Loss Expectancy (SLE) times the Annual Rate of Occurrence (ARO).

Bell-laPadula

no write down no read up

The Simple Security Property -

a subject at a given security level may not read an object at a higher security level (no read-up).

The *-property (read "star"-property) -

a subject at a given security level must not write to any object at a lower security level (no write-down).

Biba

no write up no read down

The Simple Integrity Axiom

a subject at a given level of integrity must not read an object at a lower integrity level (no read down).

The * (star) Integrity Axiom

states that a subject at a given level of integrity must not write to any object at a higher level of integrity (no write up).

Clark-Wilson

integrity

Graham-Denning:

securely creating objects

SSE-CMM Maturity Model


Level 1: Performed Informally

You have to do it before you manage its:

SSE-CMM Maturity Model


Level 2: Planned & Tracked

Understand what is happening on the project before defining organization wide processes

SSE-CMM Maturity Model


Well Defined

Use the best of what you have learned from your project to create organization wide processes

SSE-CMM Maturity Model


Quantitatively Controlled

You can't measure it until you know what It is you want to measure

SSE-CMM Maturity Model


Level 5: Continuously Improving

Foundation of sound management and awareness

Due care

doing what a reasonable person would do (i.e. the prudent man rule)

Due diligence
the management of due care.
Gross negligence
the opposite of due care.
Best practice
a consensus of the best way to do some task.

Certification

a detailed inspection that verifies whether a system meets the documented security requirements.

Accreditation

the Data Owner’s acceptance of the risk represented by that system

PAP


Password Authentication Protocol

It isthe most basic form of authentication, in which a user's name and password are transmitted over a network and compared to a table of name-password pairs. Typically, the passwords stored in the table are encrypted, however the transmissions of the passwords are in clear text, unencrypted.

SPAP


Shiva Password Authentication Protocol

username and password are both encrypted when they are sent, unlike PAP which sends them in clear text

Extensible Authentication Protocol

Sits inside PPP and provides generalized framework for many different authentication methods.

Challenge-Handshake Authentication Protocol

After the Link Establishment phase is complete, the authenticator sends a "challenge" message to the peer.The peer responds with a value calculated using a "one-way hash" function.The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged; otherwise the connection SHOULD be terminated.At random intervals, the authenticator sends a new challenge to the peer, and repeats steps 1 to 3