| A | B |
| Trusted Computing Base | total of protective mechanisms on a computer |
| Internal Threats | issues within a trusting computer base |
| TCSEC | set of standards that assigns levels of security for operating systems and software |
| C2 | highest level assigned by tcsec to OS |
| CCITSE | globally accepted standards that replaced TCSEC |
| ITSEC | Equivalent to TCSEC |
| Principle of Least Privilege | giving users only those permissions necessary to do their job |
| NetBios | protocol used by older systems not used when connecting outside local network |
| integrity | information is only mondified or deleted by those authorized to do so |
| Availability | ensures information and equipment can only be used by authorized users |
| Confidentiality | information accessed only by those authorized |
| Certification | formalized evaluation iof security leads to this |
| Services | provide functions for authorized users |
| software dependencies | force installation of additional software to support service or application |
| attack surface | reduced by removing unneeded protocols and services |
| Security Configuration and Analysis snap-in | used to configure security on systems by building a security template |
| checksum | used to verify that file is valid |
| analysis tool | discovers changes from the inteded security configuration |
| methods of maintaing TCB | monitoring, enforcing procedures, secure design, regular updates |
| security baseline | security policy, procedural document, security template-standard foundational level of security across all systems |
| Acceptable Use Policy | outlines how users should use IT resources |
| Product Certification | needed for purchasing by U.S government |