Java Games: Flashcards, matching, concentration, and word search.

computer Science Security + Ch.2

AB
Trusted Computing Basetotal of protective mechanisms on a computer
Internal Threatsissues within a trusting computer base
TCSECset of standards that assigns levels of security for operating systems and software
C2highest level assigned by tcsec to OS
CCITSEglobally accepted standards that replaced TCSEC
ITSECEquivalent to TCSEC
Principle of Least Privilegegiving users only those permissions necessary to do their job
NetBiosprotocol used by older systems not used when connecting outside local network
integrityinformation is only mondified or deleted by those authorized to do so
Availabilityensures information and equipment can only be used by authorized users
Confidentialityinformation accessed only by those authorized
Certificationformalized evaluation iof security leads to this
Servicesprovide functions for authorized users
software dependenciesforce installation of additional software to support service or application
attack surfacereduced by removing unneeded protocols and services
Security Configuration and Analysis snap-inused to configure security on systems by building a security template
checksumused to verify that file is valid
analysis tooldiscovers changes from the inteded security configuration
methods of maintaing TCBmonitoring, enforcing procedures, secure design, regular updates
security baselinesecurity policy, procedural document, security template-standard foundational level of security across all systems
Acceptable Use Policyoutlines how users should use IT resources
Product Certificationneeded for purchasing by U.S government


Medina County Career Center

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities