Security+ Study Guide
|
|
- CA
-
See Certificate Authority.
- CAST
-
See Carlisle Adams Stafford Tavares.
- Carlisle Adams Stafford Tavares
-
A type of symmetric block cipher defined by RFC 2144.
- CC
-
See common criteria.
- CCRA
-
See Common Criteria Recognition Agreement.
- central office
-
The primary office from which most resources extend.
- certificate
-
A digital entity that establishes who you are and is often used with e-commerce. It has your name and other identifying data within it.
- Certificate Authority (CA)
-
The issuer of digital certificates (which are then used for digital signatures or key pairs).
- certificate policies
-
Policies governing the use of certificates.
- certificate practice statement
-
The principles and procedures employed in the issuing and managing of certificates.
- certificate revocation list
-
A list of digital certificate revocations that must be regularly downloaded to stay current.
- certificate revocation
-
The act of removing a certificate from being valid.
- chain of custody
-
The log of the history of evidence that has been collected.
- Challenge Handshake Authentication Protocol (CHAP)
-
A protocol that challenges a system to verify identity. CHAP is an improvement over PAP (Password Authentication Protocol) in which one-way hashing is incorporated into a three-way handshake. RFC 1334 applies to both PAP and CHAP.
- change documentation
-
Documentation required to make a change in the scope of any particular item. In the realm of project management, a change document is a formal document requiring many signatures before key elements of the project can be modified.
- CHAP
-
See Challenge Handshake Authentication Protocol.
- checkpoints
-
A certain action or moment in time that is used as to perform a check. This allows for a restart to begin at the last point that the data was saved as opposed to from the beginning.
- checksum
-
A hexadecimal value computed from transmitted data that is used in error- checking routines.
- cipher
-
See cryptographic algorithm.
- circuit switching
-
A switching method where a dedicated connection between the sender and receiver is maintained throughout the conversation.
- Clark-Wilson model
-
An integrity model for creating a secure architecture.
- cleartext
-
Unencrypted text that can be read with any editor.
- client
-
A client is a part of a client/server network. It is the part where the computing is usually done. In a typical setting, a client will use the server for remote storage, backups, or security such as a firewall.
- client/server network
-
A server-centric network in which all resources are stored on a file server and processing power is distributed among workstations and the file server.
- clipper chip
-
An early encryption system offered by the NSA for civilian use that was a hardware implementation of the skipjack encryption algorithm.
- clustering
-
A method of balancing loads and providing fault tolerance.
- coax
-
A type of cabling used in computer networks.
- code escrow
-
The storage and conditions of release of source code provided by a vendor.
- cold site
-
A physical site that has all the resources to enable it to be used if the main site is inaccessible (destroyed). Commonly, plans call for turning to a cold site within a certain number of hours after the loss of the main site.
- collection of evidence
-
The means and orderly fashion by which evidence is collected, identified, and marked.
- collusion
-
An agreement between individuals to commit fraud or deceit.
- common criteria
-
A document of specifications detailing security evaluation methods for IT products and systems.
- Common Criteria Recognition Agreement (CCRA)
-
A set of standards, formerly known as the Mutual Recognition Agreement (MRA), that define Evaluation Assurance Levels.
- Common Gateway Interface (CGI)
-
An older form of scripting that was used extensively in early web systems.
- companion virus
-
A virus that creates a new program that runs in place of an expected program of the same name.
- compartmentalization
-
Standards that support a non-hierarchical security classification.
- confidentiality
-
The act of assuring that data remains private and no one sees it except for those expected to see it.
- configuration management
-
The administration of setup and changes to configurations.
- connectionless
-
Communications between two hosts that have no previous session established for synchronizing sent data. The data is not acknowledged at the receiving end. This can allow data loss.
- connection-oriented
-
Communications between two hosts that have a previous session established for synchronizing sent data. The data is acknowledged by the receiving PC. This allows for guaranteed delivery of data between PCs.
- cookie
-
A plain text file stored on your machine that contains information about you (and your preferences) for use by a database server.
- CPS
-
See Certificate Practice Statement.
- CRC
-
See cyclical redundancy check.
- critical business functions
-
Functions upon which the livelihood of the company is dependent.
- CRL
-
See Certificate Revocation List.
- cryptanalysis
-
The study and practice of finding weaknesses in ciphers.
- cryptanalysts
-
Those who participate in cryptanalysis.
- cryptographers
-
Those who participate in the study of cryptographic algorithms.
- cryptographic algorithms
-
Symmetric algorithms, also known as ciphers, used to encrypt and decrypt data.
- cryptography
-
The field of mathematics focused on encrypting and decrypting data.
- custodian
-
A data custodian is responsible for maintaining the data, and the integrity of it, within their area.
- cyclical redundancy check (CRC)
-
An error-checking method in data communications that runs a formula against data before transmissions. The sending station then appends the resultant value (called a checksum) to the data and sends it. The receiving station uses the same formula on the data. If the receiving station doesn't get the same checksum result for the calculation, it considers the transmission invalid, rejects the frame, and asks for retransmission.
|
|