In a PKI infrastructure, the RA is responsible for verifying certificate contents for the CA. See also PKI, CA.
An open-source, User Datagram Protocol (UDP)-based client-server protocol used to authenticate remote users.
A protocol used by diskless workstations to query and discover their own IP address.
A remote access protocol typically used over dial-up facilities.
Tangible objects from the actual crime, such as the tools or weapons used and any stolen or damaged property.
Controls that restore systems and information.
The period of time that a business process must be recovered (during a disaster) in order to ensure the survival of the organization.
A microprocessor instruction set architecture that utilizes a smaller and simpler instruction set that is more efficient than CISC. See also Complex Instruction Set Computing.
An abstract machine that mediates all access to an object by a subject.
In a PKI infrastructure, a repository is a system that accepts certificates and CRLs from a CA and distributes them to authorized parties. See also CA, PKI.
Electrical noise caused by electrical components, such as fluorescent lighting and electric cables.
The encryption algorithm used by the Advanced Encryption Standard. See also AES.
A network topology where all devices are connected to a closed loop.
Accepting the loss associated with a potential risk.
A method used to identify and assess threats and vulnerabilities in a business, process, system, or activity.
Transferring the potential loss associated with a risk to a third party, such as an insurance company.
Reducing risk to a level that is acceptable to an organization.
Mitigating risk by implementing the necessary security controls, policies, and procedures to protect an asset.
A method for implementing discretionary access controls in which access decisions are based on group membership according to organizational or functional roles.
Regularly transferring key personnel into different positions or departments within an organization.
A network device that forwards packets among dissimilar networks.
A key transport algorithm based on the difficulty of factoring a number that is the product of two large prime numbers.
A method for applying mandatory access control by matching an object’s sensitivity label and a subject’s sensitivity label to determine whether access should be granted or denied.