click below
click below
Normal Size Small Size show me how
CIT292 Ch 1 and 2
CIT292 NW Security Ch 1 and 2 Terms
| Term | Definition |
|---|---|
| Information Security | Act of protecting information from unauthorized access. |
| Confidentiality | Prevention of disclosure of information to unauthorized persons. |
| Integrity | Data has not been tampered with or changed in any way. Authorization is necessary before data can be changed. |
| CIA | Three principles of information security: Confidentiality, Integrity, and Availability |
| Availability | Data is obtainable regardless of how information is stored, accessed, or protected. |
| Nonrepudiation | Have indisputable proof of something which can not be denied. |
| Authentication | Person's identity is established with proof such as login and password, smart card, etc. |
| Authorization | User is given access to certain data. Happens after authentication and includes permissions, ACLs (Access Control Lists), login or physical restrictions. |
| Accounting | Tracking of data, computer usage, and nw resources using logging, monitoring, auditing of data or resource. |
| AAA | Security concept that should be applied to security plans. Authentication, Authorization, Accounting |
| Defense in Depth | Layering of security that protect data through the entire life cycle: inception, usage, storage, transfer, and disposal |
| Ethical Hacker | Expert at breaking into systems but attacks with owners knowledge and consent to find security weaknesses. |
| White hat | nonmalicious hacker |
| Gray hat | Hacker who has no affiliation with company, but breaks into system and lets administrator of network know. |
| Black hat | Malicious hacker that attempts to break into computer systems without authorization. Attempt theft, fraud, piracy, and so on. |
| Encryption | Act of changing information using an algorithm known as cipher to make it "unreadable" to anyone except users who have "key" to data. |
| Malware | Software designed to infiltrate a computer system and possibly damage it without the user's knowledge or consent. |
| Virus | Code that runs on a computer without the user's knowledge that infects a computer when the code is accessed and executed. |
| Worm | Code that runs on a computer without the user's knowledge that is able to self-replicate. |
| Trojan horse | Applications that appear to perform desired functions but are actually performing malicious functions behind the scenes. |
| spyware | Type of malicious software either downloaded unwittingly from a web site or installed along with some other 3rd party software. |
| Adware | Type of spyware that pops up advertisements based on what it has learned about that user. |
| Grayware | General term used to describe applications that are behaving improperly but without serious consequences; often describes spyware. |
| Rootkit | Type of software designed to gain administrative-level control over a computer system without being detected |
| Logic Bomb | Code that has, in some way, been inserted into software, it is meant to initiate some type of malicious function when specific criteria are met. |
| Easter egg | Platonic extra added to OS or app as joke; harmless cousin of logic bomb. |
| Time bomb | Trojan set off at certain date |
| Botnet | Group of compromised computers used to distribute malware across the Internet: usually made up of zombies |
| Zombie | Individual compromised computers in a botnet. |
| spam | Abuse of electronic messaging systems such as email, broadcast media, and instant messaging |
| Active interception | Also known as active inception, normally includes a computer placed between the sender and receiver in effort to capture/modify info |
| open email relay | Also known as SMTP open relay; it enables anyone on the Internet to send email through an SMTP server. |
| HIDS (Host-based Intrusion Detection System | Type of system loaded on individual computer that analyzes and monitors what happens inside that computer; example checks for file integrity. |
| Pop-up blocker | Application or add-on to a web browser that blocks pop-up windows that usually contain advertisements. |
| Ad Filtering | Ways of blocking and filtering out unwanted advertisements; pop-up blockers and content filters are ad filtering methods. |
| Content filters | Individual computer programs that block external files that use JavaScript or images from loading into the browser. |
| Personal Firewall | Application that protect an individual computer from unwanted Internet traffic using a set of rules and policies |
| Privilege escalation | Act of exploiting a bug or design flaw in a software or firmware app to gain access to resources that normally are protected from a app or user. |
| Backdoor | Used in computer programming to bypass authorization and normal security mechanisms in place. |
| Hardware Security module | (HSM)Physical device that deals with the encryption of authentication processes, digital signings, and payment processes. |
| Bluejacking | Sending of unsolicited messages to Bluetooth-enabled devices such as mobile phones and PDAs |
| Bluesnarfing | The unauthorized access of information from a wireless device through a Bluetooth device. |
| ACL (Access Control List) | List of permissions on an object. Specify what level of access user, groups, have to an object. When dealing with firewalls, set of rules that apply to a list of network names, IP addresses, and port numbers. |