Flashcards in T-GLOSSARY Deck (15)
Anything (e.g., object, substance, human) that is capable of acting against an asset in a manner that can result in harm. A potential cause of an unwanted incident. (ISO/IEC 13335).
Methods and things used to exploit a vulnerability. Examples include determination, capability, motive and resources.
An evaluation of the type, scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against information assets. The threat analysis usually also defines the level of threat and the likelihood of it materializing.
The identification of types of threats to which an organization might be exposed.
Any event where a threat element/actor acts against an asset in a manner that has the potential to directly result in harm
Used to describe a given threat and the harm it could to do a system if it has a vulnerability
The method a threat uses to exploit the target
A device that is used to authenticate a user, typically in addition to a user name and password.
A token is usually a device that displays a pseudo
random number that changes every few minutes.
Total cost of ownership (TCO)
Includes the original cost of the computer plus the cost of: software, hardware and software upgrades, maintenance, technical support, training, and certain activities performed by users
Transmission Control Protocol (TCP)
A connection-based Internet protocol that supports reliable data transfer connections
Packet data are verified using checksums and
re-transmitted if they are missing or corrupted. The application plays no part in validating the transfer.
A system that employs sufficient hardware and software assurance measures to allow its use for processing simultaneously a range of sensitive or classified information
Commonly used to bridge between incompatible hosts/routers or to provide encryption; a method by which one network protocol encapsulates another protocol within itself
The use of two independent mechanisms for authentication, (e.g., requiring a smart card and a password); typically the combination of something you know, are or have