C

CA

See Certificate Authority.

CAST

See Carlisle Adams Stafford Tavares.

Carlisle Adams Stafford Tavares

A type of symmetric block cipher defined by RFC 2144.

CC

See common criteria.

CCRA

See Common Criteria Recognition Agreement.

central office

The primary office from which most resources extend.

certificate

A digital entity that establishes who you are and is often used with e-commerce. It has your name and other identifying data within it.

Certificate Authority (CA)

The issuer of digital certificates (which are then used for digital signatures or key pairs).

certificate policies

Policies governing the use of certificates.

certificate practice statement

The principles and procedures employed in the issuing and managing of certificates.

certificate revocation list

A list of digital certificate revocations that must be regularly downloaded to stay current.

certificate revocation

The act of removing a certificate from being valid.

chain of custody

The log of the history of evidence that has been collected.

Challenge Handshake Authentication Protocol (CHAP)

A protocol that challenges a system to verify identity. CHAP is an improvement over PAP (Password Authentication Protocol) in which one-way hashing is incorporated into a three-way handshake. RFC 1334 applies to both PAP and CHAP.

change documentation

Documentation required to make a change in the scope of any particular item. In the realm of project management, a change document is a formal document requiring many signatures before key elements of the project can be modified.

CHAP

See Challenge Handshake Authentication Protocol.

checkpoints

A certain action or moment in time that is used as to perform a check. This allows for a restart to begin at the last point that the data was saved as opposed to from the beginning.

checksum

A hexadecimal value computed from transmitted data that is used in error- checking routines.

cipher

See cryptographic algorithm.

circuit switching

A switching method where a dedicated connection between the sender and receiver is maintained throughout the conversation.

Clark-Wilson model

An integrity model for creating a secure architecture.

cleartext

Unencrypted text that can be read with any editor.

client

A client is a part of a client/server network. It is the part where the computing is usually done. In a typical setting, a client will use the server for remote storage, backups, or security such as a firewall.

client/server network

A server-centric network in which all resources are stored on a file server and processing power is distributed among workstations and the file server.

clipper chip

An early encryption system offered by the NSA for civilian use that was a hardware implementation of the skipjack encryption algorithm.

clustering

A method of balancing loads and providing fault tolerance.

coax

A type of cabling used in computer networks.

code escrow

The storage and conditions of release of source code provided by a vendor.

cold site

A physical site that has all the resources to enable it to be used if the main site is inaccessible (destroyed). Commonly, plans call for turning to a cold site within a certain number of hours after the loss of the main site.

collection of evidence

The means and orderly fashion by which evidence is collected, identified, and marked.

collusion

An agreement between individuals to commit fraud or deceit.

common criteria

A document of specifications detailing security evaluation methods for IT products and systems.

Common Criteria Recognition Agreement (CCRA)

A set of standards, formerly known as the Mutual Recognition Agreement (MRA), that define Evaluation Assurance Levels.

Common Gateway Interface (CGI)

An older form of scripting that was used extensively in early web systems.

companion virus

A virus that creates a new program that runs in place of an expected program of the same name.

compartmentalization

Standards that support a non-hierarchical security classification.

confidentiality

The act of assuring that data remains private and no one sees it except for those expected to see it.

configuration management

The administration of setup and changes to configurations.

connectionless

Communications between two hosts that have no previous session established for synchronizing sent data. The data is not acknowledged at the receiving end. This can allow data loss.

connection-oriented

Communications between two hosts that have a previous session established for synchronizing sent data. The data is acknowledged by the receiving PC. This allows for guaranteed delivery of data between PCs.

cookie

A plain text file stored on your machine that contains information about you (and your preferences) for use by a database server.

CPS

See Certificate Practice Statement.

CRC

See cyclical redundancy check.

critical business functions

Functions upon which the livelihood of the company is dependent.

CRL

See Certificate Revocation List.

cryptanalysis

The study and practice of finding weaknesses in ciphers.

cryptanalysts

Those who participate in cryptanalysis.

cryptographers

Those who participate in the study of cryptographic algorithms.

cryptographic algorithms

Symmetric algorithms, also known as ciphers, used to encrypt and decrypt data.

cryptography

The field of mathematics focused on encrypting and decrypting data.

custodian

A data custodian is responsible for maintaining the data, and the integrity of it, within their area.

cyclical redundancy check (CRC)

An error-checking method in data communications that runs a formula against data before transmissions. The sending station then appends the resultant value (called a checksum) to the data and sends it. The receiving station uses the same formula on the data. If the receiving station doesn't get the same checksum result for the calculation, it considers the transmission invalid, rejects the frame, and asks for retransmission.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net