Glossary
Term Description
Domain
1) A realm of trust or a collection of subjects and objects that share a common security policy. Each domain’s access control is maintained independently of other domains’ access control. This results in decentralized access control when multiple domains are involved. 2) An area of study for the CISSP exam. System or group of systems operating under a common security policy. The set of objects that a subject (user or process) has the ability to access.
DSA
Digital Signature AlgorithmDigital signature algorithm.
DSL
Digital Subscriber LineDigital subscriber line.
Due Care
Managers and their organizations have a duty to provide for information security to ensure that the type of control, the cost of control, and the deployment of control are appropriate for the system being managed. The steps taken to ensure that assets and employees of an organization have been secured and protected and that upper management has properly evaluated and assumed all unmitigated or transferred risks.
Dynamic Host Configuration Protocol (DHCP)
A protocol used to assign TCP/IP configuration settings to systems upon bootup. DHCP uses UDP port 67 for server point- to-point response and port 68 for client request broadcast. DHCP supports centralized control and management of network addressing. DHCP is an industry standard protocol used to dynamically assign IP addresses to network devices.
Eavesdropping
Another term for sniffing. However, eavesdropping can include more than just capturing and recording network traffic. Eavesdropping also includes recording or listening to audio communications, faxes, radio signals, and so on. The unauthorized interception of informationbearing emanations through methods other than wiretapping.
Education
A detailed endeavor where students and users learn much more than they actually need to know to perform their work tasks. Education is most often associated with users pursuing certification or seeking job promotion. IT security education focuses on developing the ability and vision to perform complex, multidisciplinary activities and the skills needed to further the IT security profession. Education activities include research and development to keep pace with changing technologies and threats.
Electromagnetic interference (EMI)
A type of electrical noise that can do more than just cause problems with how equipment functions; it can also interfere with the quality of communications, transmissions, and playback. Electromagnetic waves emitted by a device.
Electronic signature
Any technique designed to provide the electronic equivalent of a handwritten signature to demonstrate the origin and integrity of specific data. Digital signatures are an example of electronic signatures. See digital signature.
Encapsulation
The process of adding a header and footer to a PDU as it travels down the OSI model layers. The technique used by layered protocols in which a layer adds header information to the protocol data unit (PDI) from the layer above.