FRR The False Rejection Rate or Type I Error is the percentage of valid users who are falsely rejected.
FAR The False Acceptance Rate or Type II Error is the percentage of invalid users who are falsely accepted.
CER The Crossover Error Rate is the point at which the False Rejection Rate equals the False Acceptance Rate.
Ping of death Employs an oversize IP packet
Smurf Sends a message to the broadcast address of a subnet or network so that every node on the network produces one or more response packets
Syn flood Sends TCP connection requests faster than a machine can process them
Trinoo A DDoS tool that can launch UDP flood attacks from various channels on a network
The DAC model is so titled because the user controls who has access to the system he maintains.
The MAC model uses the system rather than the user to who has access. The MAC model is typically used by organizations that handle highly sensitive data.
RBAC models place users into groups to maintain access. These are used extensively by banks and other organizations.
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
Acknowledgments
We Want to Hear from You!
Introduction
Self-Assessment
The CISSP Certification Exam
Physical Security
Security-Management Practices
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Operations Security
Business Continuity Planning
Law, Investigations, and Ethics
Cryptography
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2