Section 1.8. Terms and Concepts


1.8. Terms and Concepts

Virus, Trojan horse, worm, rabbit, salami, firewall, spray paint, mental poker, orange book, war dialer. The vocabulary of computer security is rich with terms that capture your attention. Also, the field is filled with acronyms: DES, AES, RSA, TCSEC, CTCPEC, ITSEC, PEM, PGP, and SSE CMM, to list a few. All of these are explained in this book. Each chapter ends with a list of terms and concepts, in order of their occurrence, as a way to review and see whether you have learned the important points of the chapter.

The list for this chapter includes some terms that may be new, as well as the major concepts introduced here. Although these terms are elaborated on in future chapters, it is good to begin now to learn the terms and the underlying concepts.

computing system, 5

principle of easiest penetration, 5

hardware, 6

software, 6

data, 6

vulnerability, 6

threat, 6

attack, 7

control, 7

interruption, 8

interception, 8

modification, 8

fabrication, 8

method, 8

opportunity, 8

motive, 8

security, secure, 10

confidentiality, 10

integrity, 10

availability, 10

secrecy, 10

privacy, 10

configuration management, 15

logic bomb, 16

Trojan horse, 16

virus, 16

trapdoor, 16

information leak, 16

principle of adequate protection, 17

salami attack, 19

replay, 19

cracker, 22

prevention, 23

deterrence, 23

deflection, 23

detection, 23

recovery, 23

encryption, 25

protocol, 26

policy, 27

procedure, 27

physical control, 27

principle of effectiveness, 28

overlapping control, 29

layered defense, 29

principle of weakest link, 29

administrative control, 31




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net