Computer And Network Security, Chapter 1
Wireless LAN (WLAN)
A LAN that uses radio transmissions to connect computers and devices instead of wires or cables.
Network Interface Card (NIC)
A network interface card (NIC) is a circuit board or card that is installed in a computer so that it can be connected to a network.
Hardening
A process of changing hardware and software configurations to make computers and devices as secure as possible. Reducing available ways of attack typically includes changing default passwords, the removal of unnecessary software, unnecessary usernames or logins, and the disabling or removal of unnecessary services.
Instant Messaging (IM) Chat
A type of online chat that offers real-time text transmission over the Internet. A LAN messenger operates in a similar way over a local area network.
Vulnerability
A weakness that allows a threat to be realized or to have an effect on an asset.
Acceptable Use Policy
Acceptable Use Policy or (AUP) is list of rules you must follow in order to use a Website or internet service. It is similar to a software license agreement (SLA), but is used specifically for Internet services.
Security Control
Action an organization takes to help reduce risk
BlackBerry
Electornic devices and services--usually mobile or wireless devices
Ciphertext
Encrypted data, the opposite of cleartext. Data sent as ciphertext is not intelligible or decipherable
Biometric
Measures physiological characteristic for positive identification of user
Trivial File Transfer Protocol (TFTP)
TFTP is a protocol for performing file transfers. TFTP utilizes UDP as a connectionless data transmission but in cleartext. This is used for small and quick file transfers, given that it does not guarantee individual packet delivery.
Personal Digital Assistant (PDA)
Term for a small, mobile, handheld device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedules, calendars and address book information handy.
FICO
A FICO score is a type of credit score created by the Fair Isaac Corporation. Lenders use borrowers' FICO scores along with other details on borrowers' credit reports to assess credit risk and determine whether to extend credit.
Family Educational Rights and Privacy Act (FERPA)
A Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education
Smartphone
A cell phone that runs mobile communications software and supports voice, Internet browsing, email, and text messaging
Ping
A computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source.
Service Level Agreement (SLA)
A contractual commitment by a service provider or support organization to its customers or users
Demilitarized zone (DMZ)
A demilitarized zone, DMZ or DZ is an area in which treaties or agreements between nations, military powers or contending groups forbid military installations, activities or personnel.
Disaster Recovery Plan (DRP)
A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. Such a plan, ordinarily documented in written form, specifies procedures an organization is to follow in the event of a disaster.
Cyberspace
A domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
Local Area Network (LAN)
A group of computers and associated devices that share a common communications line or wireless link to a server. Typically, a LAN encompasses computers and peripherals connected to a server within a distinct geographic area such as an office or a commercial establishment.
End User License Agreement (EULA)
A legal contract between a software application author or publisher and the user of that application.
Trojan
A malicious software code that appears benign to the user but actually performs a task on behalf of a perpetrator with malicious intent.
Virtual Private Network (VPN)
A method of encrypting IP packets from one end to another, as in a tunnel.
Proxy Firewalls
A network security system that protects network resources by filtering messages at the application layer.
Layer 2 Switch
A network switch that examines the MAC layer address of an IP packet to determine where to send it. A Layer 2 switch supports LAN connectivity, typically via unshielded twisted-pair cabling at 10/100/1000 or 10 Gbps Ethernet speeds
Layer 3 Switch
A network switch that examines the network layer address of an Ethernet frame to determine where to route it. A Layer 3 switch supports LAN connectivity, typically via unshielded twisted-pair cabling at 10/100/1000 or 10 Gbps Ethernet speeds and is the same thing as the router
International Information Systems Security Certification Consortium
A non-profit organization which specializes in information security education and certifications.
Telnet
A non-secure application that supports remote terminal access in cleartext transmission.
Simple Network Management Protocol (SNMP)
A non-secure connectionless UDP-based protocol that is used to transmit network-management data between IP devices and an SNMP network manager.
Business Continuity Planning
A plan for how to handle outages to IT systems, applications, and data access in order to maintain business operations
Wireless access point (WAP)
A radio transceiver device that transits and receives IP communications via wireless LAN technology.
Proxy Server
A server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.
IT Security Policy Framework
A set of high-level policies on security, mainly affecting the UK government and its suppliers.
Virus
A software program that attaches itself to or copies itself into another program for the purpose of causing the computer to follow instructions that were intended by the original program developer.
Vulnerability Assessment
A software review that identifies bugs or errors in software.
File Transfer Protocol (FTP)
A standard network protocol used for the transfer of computer files between a client and server on a computer network.
Information Systems
A system composed of people and computers that processes or interprets information. The term is also sometimes used in more restricted senses to refer to only the software used to run a computerized database or to refer to only a computer system.
Multiprotocol Label Switching (MPLS)
A type of data-carrying technique for high-performance telecommunications networks. MPLS directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table.
Confidentiality
Allows authorized users to access sensitive and protected data. Specific mechanisms ensure confidentiality and safeguard data from harmful intruders.
Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
An Intrusion Detection System (IDS) is a network security technology originally built for detecting vulnerability exploits against a target application or computer. / Intrusion Prevention Systems (IPS) extended IDS solutions by adding the ability to block threats in addition to detecting them and has become the dominant deployment option for IDS/IPS technologies.
Wireless Fidelity (Wi-Fi)
An alliance among wireless manufacturers to brand certified products that interoperate with wireless LAN standards. A Wi-Fi hotspot is a wireless LAN access location.
Application Gateway Firewalls
An application gateway or application level gateway (ALG) is a firewall proxy which provides network security. It filters incoming node traffic to certain specifications which mean that only transmitted network application data is filtered.
Two-step authentication
An authentication method that uses two types of authentication credentials. See also two-step authentication.
Software Vulnerability
An error or bug in software code that can be exploited
Threat
Any action that could damage an asset
Malicious Code
Any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
Availability
Availability, in the context of a computer system, refers to the ability of a user to access information or resources in a specified location and in the correct format.
Business Impact Analysis
Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
Thick Client
Client software that handles user I/O and most business logic (data processing), only using the server for data storage and data access
Thin Client
Client software that only handles user I/O functionality, and depends on servers to perform most business logic (data processing), data storage, and data access
E-Commerce
Commercial transactions conducted electronically on the Internet.
Cryptography
Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.
Hypertext Transfer Protocol Secure
HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security, or its predecessor, Secure Sockets Layer. The main motivation for HTTPS is authentication of the visited website and protection of the privacy and integrity of the exchanged data.
Integrity
Methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
Network Operations Center (NOC)
One or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
Health Insurance Portability and Accountability Act
Passed in 1996, HIPAA requires health care organizations to have security and privacy controls implemented to ensure patient privacy
Gramm-Leach-Bliley Act
Passed in 1999, GLBA requires all types of financial institutions to protect customers' private financial information.
Children's Internet Protection Act
Passed in 2000 and updated in 2011, CIPA requires public schools and public libraries to use an Internet safety policy. The policy must address: *restricting children's access to inappropriate matter on the internet *ensuring children's security when using email, chatrooms and other electronic communications *restricting hacking and other unlawful activities by children online *disclosing and distributing personal information about children without permission *restricting children's access to harmful materials *warning children on the use and dangers of social media
Sarbanes-Oxley Act (SOX)
Passed in 2002, SOX requires publicly traded companies to submit accurate and reliable financial reporting. This law doesn't require securing private information, but it does require security controls to protect the confidentiality and integrity of the reporting itself.
Secure Sockets Layer Virtual Private Network (SSL-VPN)
SSL-VPN is a means of securing remote access to a secure Web site. In other words, it's a VPN that runs on Secure Sockets Layer and encryts communication to a secure Web server via a secure browser connection.
Protocol
Set of rules in which computers communicate with each other. The protocol says what part of the conversation comes at which time. It also says how to end the communication
Network Keys
Software encryption keys used for encrypting and decrypting keys.
Malware
Software that is intended to damage or disable computers and computer systems.
Data Classification Standard
The Berkeley Data Classification Standard is a framework for assessing data sensitivity, measured by the adverse business impact a breach of the data would have upon the campus. This standard provides the foundation for establishing protection profile requirements for each class of data
Federal Information Security Management Act 2002 (FISMA)
The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats. FISMA was signed into law part of the Electronic GovernmentAct of 2002.
The Federal Information Security Modernization Act of 2014 (FISMA 2014)
The Federal Information Security Modernization Act of 2014 (FISMA 2014) updates the Federal Government's cybersecurity practices by: Codifying Department of Homeland Security (DHS) authority to administer the implementation of information security policies for non-national security federal Executive Branch systems, including providing technical assistance and deploying technologies to such systems; Amending and clarifying the Office of Management and Budget's (OMB) oversight authority over federal agency information security practices; and by Requiring OMB to amend or revise OMB A-130 to "eliminate inefficient and wasteful reporting."
Carrier-Sense Multiple Access With Collision Detection (CSMA/CD)
The IEEE 802.3 Local Area Network stand for access and collision detection on an Ethernet Local Area Network segment
Institute of Electrical and Electronics Engineers (IEEE)
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) creates international standards for telecommunications, information technology and power generation. The IEEE is the leading standards source for a broad range of emerging technologies.
Internet
The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet.
Cybersecurity
The act of securing and protecting individuals, businesses, organizations, and governments that are connected to the Internet and the Web
Recovery Time Objective (RTO)
The amount of time it takes to recover and make a system, application, and data available for use after an outage. Business continuity plans typically define an RTO for mission-critical systems, applications, and data access.
Mean Time To Repair (MTTR)
The average time required to troubleshoot and repair failed equipment and return it to normal operating conditions.
Content Filtering
The blocking of specific keywords or phrases in domain-name and URL lookups. Specific URLs and domain names can be prevented from being accessed with web content filtering enabled.
Virtual Lan (VLAN)
The broadcast domain in Ethernet where all workstations are on the same logical LAN.
Subnet Mask Address
The complement to an IP address that defines the IP network number and IP host address.
Defense in Depth
The coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise.
Identity Theft
The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Generation Y
The generation composed of those born between 1980 and 2000 in the U.S. Members of Generation Y grew up with technologies that baby boomers did not have (i.e., cell phones, cable TV, Internet, iPods, etc.)
Unified Communications
The integration of multiple types of enterprise communication, such as instant messaging, voice, video, and data, all on a single network.
Data Breach
The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Internet of Things (IOT)
The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
Mean Time To Failure (MTTF)
The length of time a device or other product is expected to last in operation.
Risk
The likelihood that something, generally something bad, will happen to an asset.
Mean Time Between Failures (MTBF)
The predicted elapsed time between inherent failures of a system during operation. MTBF can be calculated as the arithmetic mean (average) time between failures of a system.
Encryption
The process of converting information or data into a code, especially to prevent unauthorized access.
IP default Gateway Router
The router interface's IP address that acts as your LAN's ingress/egress device.
Information Security
The state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.
Vulnerability Window
The time between a software vendor's release of a security patch and your implementation of it.
Uptime
The total amount of time the IT system, application and data was accessible.
Transmission Control protocol/Internet Protocol (TCP/IP)
This protocol is the language that computers most commonly use to communicate across the Internet. TCP/IP is not just one protocol but a suite of protocols developed for communicating across a network.
Downtime
Time during which a machine, especially a computer, is out of action or unavailable for use.
Cleartext
Unencrypted data, the opposite of ciphertext. Data sent as cleartext is readable and understandable.
IP Stateful Firewall
a network firewall that tracks the operating state and characteristics of network connections traversing it. Only packets matching a known active connection are allowed to pass the firewall.
Ethernet
a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
Hypertext Transfer Protocol
an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.
Token
can be a hardware device that sends a random number or a software token that text-messages a number to the user.
Information Systems Security
more commonly referred to as INFOSEC, refers to the processes and methodologies involved with keeping information confidential, available, and assuring its integrity. It also refers to: Access controls, which prevent unauthorized personnel from entering or accessing a system.
IEEE 802.3 CSMA/CD
standard for 10/100/1,000Mbps Ethernet networking.