trusted computing base - All of the protection mechanisms within a computer system (software, hardware, and firmware) that are responsible for enforcing a security policy.

trusted path - A mechanism within the system that enables the user to communicate directly with the TCB. This mechanism can be activated only by the user or the TCB and not by an untrusted mechanism or process.

trusted platform module - A secure crypto processor and storage module.

trusted recovery - A set of procedures that restores a system and its data in a trusted manner after the system has been disrupted or a system failure has occurred.

TTX - (TableTop eXercise) - A type of exercise in which participants respond to notional events to test out procedures and ensure they actually do what they\'re intended to and that everyone knows their role in responding to the events.

UDP - (User Datagram Protocol) - The User Datagram Protocol provides connectionless data transfer without error detection and correction.

uninterruptible power supply - Batteries that provide temporary, immediate power during times when utility service is interrupted.

UPS - (Uninterruptible Power Supply) - Batteries that provide temporary, immediate power during times when utility service is interrupted.

use case - Abstract episodes of interaction between a system and its environment.

user - A person or process that is accessing a computer system.

user datagram protocol - The User Datagram Protocol provides connectionless data transfer without error detection and correction.

user ID - A unique set of characters or code that is used to identify a specific user to a system.

validation - The act of performing tests and evaluations to test a system\'s security level to see if it complies with security specifications and requirements.

virtual local area network - Allow network administrators to use switches to create software-based LAN segments that can be defined based on factors other than physical location.

virus - A small application, or string of code, that infects applications. The main function of a virus is to reproduce, and it requires a host application to do this. It can damage data directly or degrade system performance.

VLAN - (Virtual Local Area Network) - Allow network administrators to use switches to create software-based LAN segments that can be defined based on factors other than physical location.

voice over internet protocol - A technology that allows you to make voice calls using a broadband internet connection instead of a regular (or analog) phone line.

VoIP - (Voice over Internet Protocol) - A technology that allows you to make voice calls using a broadband internet connection instead of a regular (or analog) phone line.

vulnerability - The absence or weakness of a safeguard that could be exploited.

war dialing - An attack in which a long list of phone numbers is inserted into a war-dialing program in the hope of finding a modem that can be exploited to gain unauthorized access.

waterfall developmet methodology - A development model in which each phase contains a list of activities that must be performed and documented before the next phase begins.

well-known ports - Ports 0

white-box testing - A design that allows one to peek inside the

whitelist - A set of known good resources such as IP addresses, domain names, or applications.

Wi-Fi - (Wireless Fidelity) -Primarily associated with computer networking, Wi-Fi uses the IEEE 802.11x specification to create a wireless local-area network either public or private.

wireless fidelity - Primarily associated with computer networking, Wi-Fi uses the IEEE 802.11x specification to create a wireless local-area network either public or private.

work factor - The estimated time and effort required for an attacker to overcome a security control.

worldwide interoperability for microwave access - A family of wireless broadband communication standards based on the IEEE 802.16 set of standards, which provide multiple physical layer (PHY) and Media Access Control (MAC) options.

worm - An independent program that can reproduce by copying itself from one system to another. It may damage data directly or degrade system performance by tying up resources.

write - An operation that results in the flow of information from a subject to an object.

0 Shares
Share via
Copy link
Powered by Social Snap