|
|
A rule which states that in order to access the key server if n number of administrators have the ability to perform a process, m number of those administrators must authenticate for access to occur. This may involve physical presence.
See Media Access Control.
A security policy wherein "labels" are used to identify the sensitivity of objects. When a user attempts to access the object, the label is checked to see if access should be allowed (i.e., determining if the user is operating at the same sensitivity level). It is called "mandatory" because labels are automatically applied to all data (and can only be changed by administrative action), as opposed to "discretionary" where it is up to the user to decide whether or not to apply a label.
The address that is either assigned to a network card or burned into the NIC. This is how PCs keep track of one another and keep each other separate.
A software exploitation virus that works by using the macro feature that many applications include.
Any code that is meant to do harm.
A device, such as a small room, that limits access to a small number of individuals. Mantraps typically use electronic locks and other methods to control access.
An attack that occurs when someone/thing that is trusted intercepts packets and retransmits them to another party. This has also been called TCP/IP hijacking in the past.
Attacks focused on the encryption algorithm itself, the key mechanism, or any potential area of weakness in the algorithm.
The measure of the anticipated incidence of failure of a system or component.
The measurement of how long it takes to repair a system or component once a failure occurs.
A common method of verifying integrity. The MAC is derived from the message and a key.
The signature area within a message.
An algorithm that creates a hash value. The hash value is also used to help maintain integrity. There are several versions of MD. The most common are MD5, MD4, and MD2.
A method of evaluating attacks based on attack signatures and audit trails.
Any storage medium.
A sublayer of the Data Link layer of OSI that controls the way multiple devices use the same media channel. It controls which devices can transmit and when they can transmit.
A communication device that converts digital computer signals into analog tones for transmission over the PSTN and converts them back to digital upon reception. The word "modem" is an acronym for "modulator/demodulator."
An attack that modifies information on your system.
The term employed anytime more than one factor must be considered.
Sending data to more than one address.
A virus that attacks a system in more than one way.
|
|