Unformatted text preview:

Vocabulary List*-PropertyAdvanced Encryption Standard (AES)BAN logicBell-LaPadula Model (BLP)Biba’s Low Water Mark PolicyBiba’s Ring PolicyBiba’s Strict Integrity PolicyCaesar CipherChinese Wall PolicyClark-Wilson policyCodeRed (3 versions)Common CriteriaDiffie-Hellman algorithmEvaluation Assurance Level (EAL)Huffman encodingLempel-Ziv algorithmLipner’s integrity matrix modelMD4/MD5/SHA1Needham-Schroeder ProtocolOtway-Rees ProtocolPhil ZimmermannPretty Good Privacy (PGP)Principle of Easiest PenetrationPrinciple of Least PrivilegeShared Reso urce Matrix MethodologyVigenere cipher/tableauaccess control listaccess control matrix (ACM)access control policyaddRoundKeyasymmetric cipherauthenticationavailabilitybandwidth/capacity/throughputbelief logicblock cipherblock encryption modebreakablecapability-based systemcascade ciphercertificatecertification authoritycertification chainchosen ciphertext attackchosen plaintext attackcipher block chaining mode (CBC)cipher feedback modeciphertext-only attackcollision resistantcolumnar transpositioncompressionconfidentialityconfusioncountermeasurecovert channelscryptanalysiscryptographic hash functions/cryptographic check-sumcryptographic protocolcryptographycryptosystemdenial of service (DoS)diffusiondigital signa tur e sdiscrete/zero-memory sourcediscretionary access control (DAC)distributed denial of service (DDoS)dominates relatione-mail compa tibilityelectronic code book mode (ECB)encodingencryption/decryptionentropyfalse nega tivesfalse positivesfirst-order model, etc.freshnessfundamental theorem of the noiseless channelhierarchical levelsidealizationinformation contentinformation flow policie sinformation theoryingress filteringintegrity *- propertyintegrityintegrity levels/policiesinterceptioninterleaving attackinterruptionintrusion detection system (IDS)intrusion prevention system (IPS)CS361 Final Vocabulary List 2key distribution/management/revocationkey exchange problemkey stream generation modeskeyed cipher/keyless cipherkeyspaceknown plaintext attacklattice-based sec uritylocal/remo te a ttackslossless encodingmalleable algorithmmandatory access controls (MAC)message digestmetapolicymixColumnsmodes of usagemonoalphabetic ciphermulti-level se c urity (MLS)need-to-know categoriesnoisy/noiselessnon-alterablenon-interferencenon-repudiationnoncesnth order Markov sourceobjectsone-time padone-way functionoutput feedback mode (OFB)packet sniffingpartial o rderpassphrase-based sy mmetric keysperfect cipherplaintext/ciphertextpolicy/mechanism/assurance distinctionpolyalphabetic substitutionprefix-freeprincipalprivate key ringproduct cipherprotection profile (PP)protocolpseudo-random number generator (PRNG)public key algorithmpublic key infrastructure (PKI)public key ringradix-64 conversionread/write/execute/create/destroy permiss ionsreplay attackrole-based access control (RBAC)securitysecurity labels/levelssecurity model/policysecurity target (ST)segmentationsender/receiverseparation of dutyseparation of functionsession keyshared-key authentication protocolshiftRowssimple integrity propertysimple security propertysimple substitution cipherstorage channelsstream cipherstrong cryptos ystemstrong tranquility propertysubBytessubjectssubstitution ciphersymmetric channelsymmetric cipher/secret key algorithmsyn floodingsystem attributesystem highsystem lowtarget of evaluation (TOE)threattimestamptiming channelstotal ordertranspositiontrusted subjectunforgeableuniquely decodableunwinding theore mvulnerabilitywater mark policyweak tranquility propertyzero-order


View Full Document

UT CS 361 - Vocabulary List

Documents in this Course
Load more
Download Vocabulary List
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Vocabulary List and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Vocabulary List 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?