T-GLOSSARY Flashcards

1
Q

Threat

A

Anything (e.g., object, substance, human) that is capable of acting against an asset in a manner that can result in harm. A potential cause of an unwanted incident. (ISO/IEC 13335).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat agent

A

Methods and things used to exploit a vulnerability. Examples include determination, capability, motive and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat analysis

A

An evaluation of the type, scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against information assets. The threat analysis usually also defines the level of threat and the likelihood of it materializing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat assessment

A

The identification of types of threats to which an organization might be exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat event

A

Any event where a threat element/actor acts against an asset in a manner that has the potential to directly result in harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat model

A

Used to describe a given threat and the harm it could to do a system if it has a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat vector

A

The method a threat uses to exploit the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Token

A

A device that is used to authenticate a user, typically in addition to a user name and password.
A token is usually a device that displays a pseudo
random number that changes every few minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Total cost of ownership (TCO)

A

Includes the original cost of the computer plus the cost of: software, hardware and software upgrades, maintenance, technical support, training, and certain activities performed by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transmission Control Protocol (TCP)

A

A connection-based Internet protocol that supports reliable data transfer connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Scope Notes:

A

Packet data are verified using checksums and

re-transmitted if they are missing or corrupted. The application plays no part in validating the transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trusted system

A

A system that employs sufficient hardware and software assurance measures to allow its use for processing simultaneously a range of sensitive or classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tunneling

A

Commonly used to bridge between incompatible hosts/routers or to provide encryption; a method by which one network protocol encapsulates another protocol within itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two-factor authentication

A

The use of two independent mechanisms for authentication, (e.g., requiring a smart card and a password); typically the combination of something you know, are or have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Uniform resource locator (URL)

A

The global address of documents and other resources on the World Wide Web. The first part of the address indicates what protocol to use; the second part specifies the IP address or the domain name where the
resource is located (e.g., http://www.isaca.org).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly