Vocabulary List*-PropertyAdvanced Encryption Standard (AES)BAN logicBell-LaPadula Model (BLP)Biba’s Low Water Mark PolicyBiba’s Ring PolicyBiba’s Strict Integrity PolicyCaesar CipherChinese Wall PolicyClark-Wilson policyCodeRed (3 versions)Common CriteriaDiffie-Hellman algorithmEvaluation Assurance Level (EAL)Huffman encodingLempel-Ziv algorithmLipner’s integrity matrix modelMD4/MD5/SHA1Needham-Schroeder ProtocolOtway-Rees ProtocolPhil ZimmermannPretty Good Privacy (PGP)Principle of Easiest PenetrationPrinciple of Least PrivilegeShared Reso urce Matrix MethodologyVigenere cipher/tableauaccess control listaccess control matrix (ACM)access control policyaddRoundKeyasymmetric cipherauthenticationavailabilitybandwidth/capacity/throughputbelief logicblock cipherblock encryption modebreakablecapability-based systemcascade ciphercertificatecertification authoritycertification chainchosen ciphertext attackchosen plaintext attackcipher block chaining mode (CBC)cipher feedback modeciphertext-only attackcollision resistantcolumnar transpositioncompressionconfidentialityconfusioncountermeasurecovert channelscryptanalysiscryptographic hash functions/cryptographic check-sumcryptographic protocolcryptographycryptosystemdenial of service (DoS)diffusiondigital signa tur e sdiscrete/zero-memory sourcediscretionary access control (DAC)distributed denial of service (DDoS)dominates relatione-mail compa tibilityelectronic code book mode (ECB)encodingencryption/decryptionentropyfalse nega tivesfalse positivesfirst-order model, etc.freshnessfundamental theorem of the noiseless channelhierarchical levelsidealizationinformation contentinformation flow policie sinformation theoryingress filteringintegrity *- propertyintegrityintegrity levels/policiesinterceptioninterleaving attackinterruptionintrusion detection system (IDS)intrusion prevention system (IPS)CS361 Final Vocabulary List 2key distribution/management/revocationkey exchange problemkey stream generation modeskeyed cipher/keyless cipherkeyspaceknown plaintext attacklattice-based sec uritylocal/remo te a ttackslossless encodingmalleable algorithmmandatory access controls (MAC)message digestmetapolicymixColumnsmodes of usagemonoalphabetic ciphermulti-level se c urity (MLS)need-to-know categoriesnoisy/noiselessnon-alterablenon-interferencenon-repudiationnoncesnth order Markov sourceobjectsone-time padone-way functionoutput feedback mode (OFB)packet sniffingpartial o rderpassphrase-based sy mmetric keysperfect cipherplaintext/ciphertextpolicy/mechanism/assurance distinctionpolyalphabetic substitutionprefix-freeprincipalprivate key ringproduct cipherprotection profile (PP)protocolpseudo-random number generator (PRNG)public key algorithmpublic key infrastructure (PKI)public key ringradix-64 conversionread/write/execute/create/destroy permiss ionsreplay attackrole-based access control (RBAC)securitysecurity labels/levelssecurity model/policysecurity target (ST)segmentationsender/receiverseparation of dutyseparation of functionsession keyshared-key authentication protocolshiftRowssimple integrity propertysimple security propertysimple substitution cipherstorage channelsstream cipherstrong cryptos ystemstrong tranquility propertysubBytessubjectssubstitution ciphersymmetric channelsymmetric cipher/secret key algorithmsyn floodingsystem attributesystem highsystem lowtarget of evaluation (TOE)threattimestamptiming channelstotal ordertranspositiontrusted subjectunforgeableuniquely decodableunwinding theore mvulnerabilitywater mark policyweak tranquility propertyzero-order
View Full Document