Access

  1. Physical Access.
    The process of obtaining use of a computer system, development tools, or direct access to a system and its components. For example by sitting down at a keyboard, or being able to enter specific area(s) of the organization where the main computer systems are located, or accessing system level hardware or in some cases even board level components.
  2. Logical Access.
    The process of being able to enter, modify, delete, or inspect records, designs, schematics, source code, and other data held on a computer system or device by means of providing an ID and password (if required). The view that restricting physical access relieves the need for logical access restrictions is misleading. Any organization, systems, or devices within a system with communications links to the outside world has a security risk of logical access.

Access Control

Access control refers to the rules and deployment of mechanisms that control access to information systems, and physical access to premises and systems. The entire subject of Information Security is based upon Access Control, without which Information Security cannot, by definition, exist.

Access Rights

The powers granted to users to create, change, delete, or simply view data and files within a system, according to a set of rules defined by IT and business management. It is not necessarily true that the more senior a person, the more power granted. For example, most logic design activity is performed at a relatively junior level, and it is not uncommon for senior management to not even have access rights to view schematic level data. There are very good Internal Control and Audit reasons for adopting this approach.

Accidental Damage

In relation to System and Device level Security, accidental damage refers to damage or loss that is caused as a result of a genuine error or misfortune. However, despite the genuine nature of the accident, such incidents can and should be prevented by awareness, alertness, and action.

AES

Advanced Encryption Standard. This is a state of the art algorithm developed by Rijndael and chosen by the United States National Institute of Standards and Technology on October 2, 2000. Although selected, it was not officially "approved" by the US Secretary of Commerce until Q2 2001.

ANSI

American National Standards Institute which is the main organization responsible for furthering technology standards within the USA. ANSI is also a key player with the International Standards Organization (ISO).

Antifuse FPGA

An FPGA based on a technology that utilizes amorphous silicon to make the interconnect. Antifuse FPGAs are one-time-programmable, live at power up, and secure.

Application

A computer system, program, or set of programs.

ASIC

Application-Specific Integrated Circuit. Typically a custom solution constructed to order for a specific application and function. Associated with significant barriers to entry that limit participation to high volume applications that can benefit from economies of scale.

Auditor

Person employed to independently verify the quality and integrity of the work that has been undertaken within a particular area, with reference to accepted procedures.

Authentication

Authentication refers to the verification of the authenticity of either a person or of data, e.g. a message may be authenticated to have been originated by its claimed source. Authentication techniques usually form the basis for all forms of access control to systems and data.

Authorization

The process whereby a person approves a specific event or action. In companies with access rights hierarchies it is important that audit trails identify both the creator and the authorizer of new or amended data. It is an unacceptably high risk situation for one to have the power to create new entries and then to authorize those same entries oneself.



Backup

The process whereby copies of computer or design files are taken in order to allow recreation of the original, should the need arise. A backup is a spare copy of a file, file system, design, schematic, or other resource for use in the event of failure or loss of the original.

Ideally the backup copies should be kept at a different site or in a fire safe. Although hardware may be insured against fire, the data on it is almost certainly neither insured nor easily replaced. Consequential loss policies to insure against data loss can be expensive, but are well worth considering.

Biometric Access Controls

Security Access control systems which authenticate (verify the identity of) users by means of physical characteristics, e.g. face, fingerprints, voice, or retina pattern.

Boeing Syndrome

The ultimate disaster scenario for contingency planning purposes. The name allegedly comes from a conference in which IT specialists, administrators, and planners were asked first to imagine that a Boeing 747 Jumbo fell out of the air onto their computer center (with the resulting complete loss of systems), and then asked to prepare a contingency/disaster recovery plan to keep their organization going in such circumstances. A very useful exercise - for all companies who often do not realize just how important their computer systems are to their continued existence as a viable business. Also useful for worst case scenario security planning. For example, what would happen if the code from my core component was posted in the public domain.

Boot-up

Slang. The act of initializing a system or configuring an FPGA. Typically associated with a time delay until the system is functional. This is the time when an SRAM-based FPGA is most vulnerable to having its contents captured. (see Configuration Device)

BS 7799

The British Standard for Information Security which was re-issued in 1999 in two parts. Part 1 is the Code of Practice for Information Security Management and Part 2 specifies the requirements for implementing Information Security in compliance with the Code of Practice. In October 2000, BS 7799 was elevated to become an International Standards Organization (ISO) standard - ISO 17799.

Business Assets

The term Business Assets, as it relates to Information Security, refers to any information upon which the organization places a measurable value. By implication, the information is not in the public domain and would result in loss, damage, or even business collapse, were the information to be lost, stolen, corrupted, or in any way compromised.

By identifying and valuing the business assets in an organization, and the systems that store and process them, an appropriate emphasis may be placed upon safeguarding those assets which are of higher value than those that are considered easily replaceable - such as information in the public domain.



CERT

The Computer Emergency Response Team is recognized as the Internet's official emergency team. It was established in the USA by the Defense Advanced Research Projects Agency (DARPA) in 1988 following the Morris computer Worm incident, which crippled approximately 10% of all computers connected to the Internet.

CERT is located at the Software Engineering Institute, a US government funded research and development center operated by Carnegie Mellon University, and focuses on security breaches, denial-of-service incidents, provides alerts and incident-handling and avoidance guidelines. CERT also covers hardware and component security deficiencies that may compromise existing systems.

CERT is also the publisher of Information Security alerts, training, and awareness campaigns. CERT may be found on the World Wide Web at http://www.cert.org/.

Change Control

An internal control procedure by which only authorized amendments are made to the organization's software, hardware, network access privileges, or business process. This method usually involves the need to perform an analysis of the problem and for the results to be appended to a formal request prepared and signed by the senior representative of the area concerned. This proposal should be reviewed by management (or committee) prior to being authorized. Implementation should be monitored to ensure security requirements are not breached or diluted.

Checksum

Checksum is a technique whereby the individual binary values of a string of storage locations on your computer are totaled, and the total retained for future reference. On subsequent accesses, the summing procedure is repeated, and the total compared to the one derived previously. A difference indicates that an element of the data has changed during the intervening period. Agreement provides a high degree of assurance (but not total assurance) that the data has not changed during the intervening period.

A checksum is also used to verify that a network transmission has been successful. If the counts agree, it is safe to assume that the transmission was completed correctly.

A checksum also refers to the unique number that results by adding up every element of a pattern in a programmable logic design. Typically, either a four or eight digit hex number, it is a quick way to identify a pattern, since it is very unlikely two patterns will ever have the same checksum.

Cipher

A cipher is the generic term used to describe a means of encrypting data. In addition, the term cipher can refer to the encrypted text itself. Encryption ciphers will use an algorithm, which is the complex mathematical calculation required to 'scramble' the text, and a 'key.' Knowledge of the key will allow the encrypted data to be decrypted.

Clear Desk Policy

A policy of the organization, which directs all personnel to clear their desks at the end of each working day, and file everything appropriately. Desks should be cleared of all documents and papers, including the contents of the 'in' and 'out' trays! The purpose of the Clear Desk Policy is not simply to give the cleaners a chance to do their job, but to ensure that sensitive papers and documents are not exposed to unauthorized persons out of working hours.

Clear Screen Policy

A policy of the organization, which directs all users of screens or terminals to ensure that the contents of the screen are protected from prying eyes and other opportunistic breaches of confidentially. Typically, the easiest means of compliance is to use a screen saver that will engage, either on request, or after a specified time.

Clipper chip

A tamper-resistant VLSI chip designed by NSA for encrypting voice communications. It conforms to the Escrow Encryption Standard (EES) and implements the Skipjack encryption algorithm.

Cloning

The act of copying a design without making any changes. No understanding of the design or the ability to modify the design is required.

Communications Line

Within a communications network, the route by which data is conveyed from one point to another. Recently the term has started to be replaced by 'Communications Link' to reflect the fact that a growing number of small networks, even within the same building, are using radio ('wireless') communications rather than fixed cables.

Communications Network

A system of communications equipment and communication links (by line, radio, satellite, etc.) that enables computers to be separated geographically while remaining connected to each other.

Computer Viruses

Computer Viruses are pieces of programming code that have been purposely written to inflict an unexpected result upon an innocent victim. There are now approximately 50,000 viruses and their variants for which known cures or 'vaccines' are available.

Viruses are transmitted within other (seemingly) legitimate files or programs, the opening, or execution of which, causes the virus to run and to replicate itself within your computer system, as well as performing some sort of action. Such actions can be as harmless as causing characters to 'fall off' the screen (early DOS based virus in the 1980s), to the most malicious viruses which destroy data files and replicate themselves to everyone in your e-mail directory.

Researchers are now looking at another possible virus that targets systems using a reconfigurable FPGA. In this scenario, a hostile party could replace a valid bitstream with random bits or a self-replicating series of bits that would likely result in internal electrical conflicts that may destroy the device.

Confidentiality

Assurance that information is shared only among authorized persons or organizations. Breaches of confidentiality can occur when data is not handled in a manner adequate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data. The classification of the information should determine its confidentiality and hence the appropriate safeguards.

Configuration

The act of programming an SRAM-based FPGA at system power up to make it functional. Configuration requires the use of a configuration device, which is typically a PROM (see PROM) or other type of memory.

Contingency Planning

Contingency planning plans for the unexpected or for the possibility of circumstances changing. Contingency plans are individual plans associated with individual projects or programs.

A contingency plan is never expected to be executed; as a result, situations in which attention to detail and the budget allocation are clearly inadequate guarantee failure if it is executed.

As with any plan, it is essential to agree the 'trigger(s)' that will result in the plan coming into force and the subsequent 'chain of command' that will take over during that period.

Corrupt Data

Data that has been received, stored, or changed, so that it cannot be read or used by the program that originally created the data.

CPLD

Complex Programmable Logic Device. Usually a simple low density programmable logic solution. Typically contains macrocells that are interconnected through a central Global Routing Pool. This type of architecture provides moderate speed and predictable performance. Traditionally targeted towards low end consumer products.

Cracker

A cracker is either a piece of software (program) whose purpose is to 'crack' the code to a password, encryption key, or configuration bitstream; or 'cracker' refers to a person who attempts to gain unauthorized access to a computer system, hardware, or board level components. Such persons are usually ill intentioned and perform malicious acts of crime and vandalism.

  • Code breaking software. A piece of software designed to decipher a code, but used most often to crack a system. Given sufficient time, and sufficient computer power, ANY password can be broken - even one of 64 case-sensitive characters.

  • Illegal entry into a computer system. These individuals often have malicious intent and can have multiple tools for breaking into a system. The term was adopted circa 1985 by hackers in defense against journalistic misuse of 'hacker.'

Cryptography

The subject of cryptography is primarily concerned with maintaining the privacy of communications, and modern methods use a number of techniques to achieve this. Encryption is the transformation of data into another usually unrecognizable form. The only means to read the data is to de-crypt the data using a (secret) key, in the form of a secret character string, itself encapsulated within a pre-formatted (computer) file.

Cybercrime

Cybercrime is any criminal activity that uses network access to commit a criminal act. With the exponential growth of Internet connection, the opportunities for the exploitation of any weaknesses in Information Security are multiplying.

Cybercrime may be internal or external, with the former easier to perpetrate.

The term has evolved over the past few years since the adoption of Internet connection on a global scale with hundreds of millions of users. Cybercrime refers to the act of performing a criminal act using cyberspace (the Internet), as the communications vehicle. Some would argue that a cybercrime is not a crime as it is a crime against software and not against a person's person or property. However, while the legal systems around the world scramble to introduce laws to combat cybercriminals, two types of attack are prevalent:

  • Techno-crime. A pre-meditated act against a system or systems, with the express intent to copy, steal, prevent access, corrupt, or otherwise deface or damage parts or all of a computer system. The 24x7 connection to the Internet makes this type of cybercrime a real possibility to engineer from anywhere in the world; leaving few if any, 'finger prints.'

  • Techno-vandalism. These acts of 'brainless' defacement of websites, and/or other activities such as copying files and publicizing their contents publicly, are usually opportunistic in nature. Tight internal security, allied to strong technical safeguards, should prevent the vast majority of such incidents.



Data Encryption

Data encryption is a means of scrambling the data so that it can only be read by the person(s) holding the 'key' - a password of some sort. Without the 'key,' the cipher cannot be broken and the data remains secure. Using the key, the cipher is decrypted and the data is returned to its original value or state.

Each time one wishes to encrypt data, a key from the 72,000,000,000,000,000 possible key variations is randomly generated and used to encrypt the data. The same key must be made known to the receiver if they are to decrypt the data.

Decryption

The process by which encrypted data is restored to its original form in order to be understood/usable by another computer or person.

Denial of Service

Denial of service (DoS) attacks deny service to valid users trying to access a site. Consistently ranked as the single greatest security problem for IT professionals, DoS attack is an Internet attack against a website whereby a client is denied the level of service expected. In a mild case, the impact can be unexpectedly poor performance. In the worst case, the server can become so overloaded as to cause a crash of the system.

DoS attacks do not usually have theft or corruption of data as their primary motive and will often be executed by persons who have a grudge against the organization concerned. The following are the main types of DoS attack:

  • Buffer Overflow Attacks whereby data is sent to the server at a rate and volume that exceeds the capacity of the system, causing errors.

  • SYN Attack. This takes places when connection requests to the server are not properly responded to, causing a delay in connection. Although these failed connection will eventually time out, should they occur in volume, they can deny access to other legitimate requests for access.

  • Teardrop Attack. The exploitation of a features of the TCP/IP protocol whereby large packets of data are split into 'bite sized chunks,' with each fragment being identified to the next by an 'offset' marker. Later the fragments are supposed to be re-assembled by the receiving system. In the teardrop attack, the attacker enters a confusing offset value in the second (or later) fragment, which can crash the recipient's system.

  • Ping Attack. This is where an illegitimate 'attention request' or Ping is sent to a system, with the return address being that of the target host (to be attacked). The intermediate system responds to the Ping request but responds to the unsuspecting victim system. If the receipt of such responses becomes excessive, the target system will be unable to distinguish between legitimate and illegitimate traffic.

  • Viruses. Viruses are not usually targeted but where the host server becomes infected, it can cause a Denial of Service.

  • Physical Attacks. A physical attack may be little more than cutting the power supply, or perhaps the removal of a network cable.

DES (Data Encryption Standards)

Definition 1) (DES) An unclassified crypto algorithm adopted by the National Bureau of Standards for public use.

Definition 2) A cryptographic algorithm for the protection of unclassified data, published in Federal Information Processing Standard (FIPS) 46. The DES, which was approved by the National Institute of Standards and Technology (NIST), is intended for public and government use.

DES ?is a data encryption standards for the scrambling of data to protect its confidentiality. It was developed by IBM in cooperation with the American National Security Agency and published in 1974. It has become extremely popular and, because it was thought to be so difficult to break, with 72,000,000,000,000,000 possible key variations, was banned from export from the USA. However, restrictions by the US Government on the export of encryption technology was lifted in 2000 to the countries of Europe and a number of other countries.

DES was cracked by researchers at MIT on November 8, 2001, when they showed that DES was susceptible to brute force attacks. Currently the industry has turned to Triple DES as a short term standard to secure transactions, though generally sluggish performance caused an outcry that resulted in a new standard. The NIST has since identified a new encryption scheme, known as AES or Rijndael as the heir apparent.

Disable

The process by which hardware or software is deliberately prevented from functioning in some way. For hardware, it may be as simple as switching off a piece of equipment, or disconnecting a cable. It is more commonly associated with software, particularly shareware or promotional software, which has been supplied to a user at little or no cost, to try before paying the full purchase or registration fee. Such software may be described as 'crippled' in that certain functions, such as saving or printing files, are not permitted. Some in-house development staff may well disable parts of a new program, so that the user can try out the parts that have been developed, while work continues on the disabled functions.

Disabling is also often used as a security measure. For example, the risk of virus infection through the use of infected floppy diskettes can be greatly reduced by disconnecting a cable within the PC, thereby disabling the floppy drive. Even greater protection is achieved by removing the drive altogether, thereby creating a diskless PC.

Dongle

A mechanical device used by software developers to prevent unlicenced use of their product. Typically, a dongle is a small connector plug, supplied with the original software package, which fits into a socket on a PC - usually a parallel port, also known generally as the LPT1 Printer port. Without the dongle present, the software will not run. Some older dongles act as a terminator, effectively blocking the port for any other use, but later versions have a pass-through function, allowing a printer to be connected at the same time. Even though the PC can still communicate with the printer, there have been problems with more recent printers, which use active two-way communications with the PC to notify printing status, ink levels, etc.



Encryption

The process by which data is temporarily re-arranged into an unreadable or unintelligible form for confidentiality, transmission, or other security purposes.



Fallback procedures

Fallback procedures are particular business procedures and measures, undertaken when events have triggered the execution of either a Business Continuity Plan or a Contingency Plan.

Firmware

A sort of 'halfway house' between hardware and software. Firmware often takes the form of a device that is attached to, or built into, a computer - such as a ROM chip - which performs some software function but is not a program in the sense of being installed and run from the computer's storage media.

Flash FPGA

An FPGA (See FPGA) that is based on Flash technology for controlling the switching of the interconnect. Flash-based FPGAs are nonvolatile, live on power-up, reprogrammable, and secure from reverse engineering or cloning.

FPGA

Field Programmable Gate Array. A very complex PLD. The FPGA usually has an architecture that comprises a large number of simple logic blocks, a number of input/output pads, and a method to make random connections between the elements.The largest fastest programmable logic devices with gate counts running into the millions.

These devices are user customizable and programmable on an individual device basis. Valued for their flexibility by designers.



Ghost

An identity that does not relate to a real person. It is not unknown for staff with the necessary IT skills to create a fictitious user with a password that allows that user to access the system with impunity, knowing that an audit trail will lead nowhere. Ghosts may also appear on the payroll, courtesy of a user who has the power to create new files in the personnel and payroll systems.

The creation of user profiles and the granting of logical access rights is a high security function and must be strictly monitored, preferably with dual controls for creation and authorization.



Hacker

An individual whose primary aim in life is to penetrate the security defenses of large, sophisticated, computer systems. A truly skilled hacker can penetrate a system right to the core and withdraw again without leaving a trace of the activity. Hackers are a threat to all computer systems that allow access from outside the organization's premises, and the fact that most 'hacking' is just an intellectual challenge should not allow it to be dismissed as a prank. Clumsy hacking can do extensive damage to systems even when such damage was not intentional.

Statistics suggest that the world's primary hacker target - the Pentagon - is attacked, on average, once every three minutes. How many of those attacks are from hackers and how many from Government Agencies, criminals, and terrorists, around the world is another question entirely.

HEX / Hexadecimal

Hexadecimal, or 'Hex' for short is a numbering system using base 16 (as opposed to the usual base 10). Hex is a useful way to express binary computer numbers in which a byte is normally expressed as having 8 bits; with 2 hex characters representing eight binary digits - aka a byte.



Identity Hacking

Posting on the Internet or Bulletin Board(s) anonymously, pseudonymously, or giving a completely false name/address/telephone with intent to deceive. This is a controversial activity, generating much discussion amongst those who maintain the internet sites. There are two cases in which problems can be caused for organizations:

  1. a member of staff engages in such practices and is 'found out' by internet users, thereby associating the organization name with the activity.

  2. a posting by an unrelated third party, pretending to be the organization, or a representative.

In either case, if such posts are abusive, or otherwise intended to stir up an argument, the likely result is a Flame Attack, or Mail Bombing.

Impact Analysis

As part of an Information Security Risk Assessment, you should identify the threats to your Business Assets and the impact such threats could have, if the threat resulted in a genuine incident.

Such analysis should quantify the value of the Business Assets being protected to decide on the appropriate level of safeguards.

Incursion

A penetration of the system by an unauthorized source. Similar to an intrusion, the primary difference is that incursions are classed as 'hostile.'

ISP (In-System Programming)

The ability to program and reprogram an FPGA that is mounted on a circuit as part of a functional system. Flash and SRAM-based FPGA technologies support ISP.

Invasive Attack

An attack on a semiconductor to determine its functionality that requires physical entry to the part and renders the part non-functional. Typical methods include etching and FIB (Focused Ion Beam) intrusion.

Information Asset

An Information Asset is a definable piece of information, stored in any manner that is recognized as 'valuable' to the organization. The information that comprises an Information Asset, may be little more than a prospect name and address file; or it may be the plans for the release of the latest in a range of products to compete with competitors.

Irrespective of the nature of the information assets themselves, they all have one or more of the following characteristics:

  • They are recognized to be of value to the organization.

  • They are not easily replaceable without cost, skill, time, resources, or a combination.

  • They form a part of the organization's corporate identity, without which the organization may be threatened.

  • Their data classification would normally be Proprietary, Highly Confidential, or even Top Secret.

It is the purpose of Information Security to identify the threats against, the risks and the associated potential damage to, and the safeguarding of Information Assets.

Information Warfare / Infowar

Also cyberwar and netwar. Infowar is the use of information and information systems as weapons in a conflict in which the information and information systems themselves are the targets.

Infowar has been divided into three classes:

  1. Individual Privacy
  2. Industrial and Economic Espionage
  3. Global information warfare, i.e. Nation State versus Nation State.

Most organizations will not need to be concerned over classes I and III, but clearly Class II is relevant to any organization wishing to protect its confidential information.

Intellectual Property (IP)

Defined as creative, technical, and intellectual products. Often associated with custom circuit designs implemented in either ASIC or Programmable Logic architectures.

Intrusion

The technology equivalent of trespassing. An uninvited and unwelcome entry into a system by an unauthorized source. While Incursions are always seen as hostile, intrusions may well be innocent, having occurred in error.

Strong verification and security systems can minimize intrusions.









Malicious Code

Malicious code includes all and any programs (including macros and scripts) that are deliberately coded in order to cause an unexpected (and usually, unwanted) event on a PC or other system. However, whereas antivirus definitions ('vaccines') are released weekly or monthly, they operate retrospectively. In other words, someone's PC has to become infected with the virus before the antivirus definition can be developed. In May 2000, when the 'Love Bug' was discovered, although the antivirus vendors worked around the clock, the virus had already infected tens of thousands of organizations around the world, before the vaccine became available.

Mission Critical

Derived from military usage, the term is used to describe activities, processing, etc., that are deemed vital to the organization's business success and, possibly, its very existence.

Some major applications are described as being Mission Critical in the sense that, if the application fails, crashes, or is otherwise unavailable to the organization, it will have a significant negative impact upon the business. Although the definition will vary from organization to organization, such applications include accounts/billing, customer balances, computer controlled machinery and production lines, JIT ordering, and delivery scheduling.



Nondisclosure Agreement - NDA

A Nondisclosure Agreement (NDA) is a legally binding document that protects the confidentiality of ideas, designs, plans, concepts or other commercial material. Most often, NDAs are signed by vendors, contractors, consultants, and other non-employees who may come into contact with such material.

Noninvasive

An attack on a semiconductor to determine its functionality that does not require physical entry to the part. Types of attacks include varying voltage levels to gain access.

Non-Repudiation

For e-Commerce and other electronic transactions, including ATMs (cash machines), all parties to a transaction must be confident that the transaction is secure, that the parties are who they say they are (authentication), and that the transaction is verified as final. Systems must ensure that a party cannot subsequently repudiate (reject) a transaction. To protect and ensure digital trust, the parties to such systems may employ digital signatures, which will not only validate the sender, but will also 'time stamp' the transaction, so it cannot be claimed subsequently that the transaction was not authorized or not valid.

Nonvolatile

The characteristic of a device that does not lose its contents when its power is removed. Nonvolatile memory is useful in microcomputer circuits because it can provide instructions for a CPU as soon as the power is applied, before secondary devices, such as disk, can be accessed. Nonvolatile memory includes ROM, EPROM, and EEPROM.



Overbuilding

Unscrupulous Contract Manufacturers (CM) will overbuild on a program or contract and sell the excess on the gray market.

Penetration

Intrusion, trespassing, unauthorised entry into a system. Merely contacting system or using a keyboard to enter a password is not penetration, but gaining access to the contents of the data files by these or other means does constitute penetration.

Penetration Testing, is the execution of a testing plan, the sole purpose of which is to attempt to hack into a system using known tools and techniques.



Physical Security

Physical Protection Measures to safeguard the Organization's systems. Including, but not limited to, restrictions on entry to premises, restrictions on entry to computer department and Tank, locking/disabling equipment, disconnection, fire-resistant and tamper-resistant storage facilities, anti-theft measures, and anti-vandal measures.

PKI (Public Key Infrastructure)

Where encryption of data is required, perhaps between the organization's internal networks and between clients and representatives, a means of generating and managing the encryption keys is required.

PKI is the use and management of cryptographic keys - a public key and a private key - for the secure transmission and authentication.

PROM

Programmable read-only memory. A semiconductor's memory device that provides read access only to its memory content. Other versions include UV PROM (Ultraviolet), which can be erased with UV light and EEPROM (electronically erasable), which can be erased electrically. PROMs are typically required to support an SRAM-based FPGA.





Resilience

Resilience refers to the ability of a computer, or system, to both withstand a range of load fluctuations and also to remain stable under continuous and or adverse conditions.

RSA

RSA stands for Rivest, Shamir, and Adleman, who are the developers of the public-key encryption and authentication algorithm. They also founders of RSA Data Security, which is now RSA Security www.rsasecurity.com.

The capability to use RSA security is incorporated within the browsers of both Microsoft and Netscape and other major corporate communication tools such as Lotus Domino® / Notes®.

The creation, use, and management of the public and private keys that are required for RSA security, use Public Key Infrastructure, or PKI.

Reverse Engineering

The act of examining a design to understand exactly how it works with the intent to copy the design. The design is then altered to differentiate it from the original design for the purpose of improving upon it or to prevent legal action because of the theft.



Security Breach

A breach of security occurs when a stated organizational policy or legal requirement regarding information security has been contravened. However, every incident suggesting that the confidentiality, integrity and availability of the information has been inappropriately changed can be considered a security incident. Every security breach will always be initiated via a security incident. Only if confirmed does it become a security breach.

Security Incident

A security incident is an alert to the possibility that a breach of security may be taking, or may have taken, place.

Shoulder Surfing

Looking over a user's shoulder as they enter a password. This is one of the easiest ways of obtaining a password to breach system security. The practice is not restricted to office computers, it is used wherever passwords, PINs, or other ID codes are used.

Skipjack

An NSA-developed encryption algorithm for the Clipper chip. The details of the algorithm are unpublished.

Smart Card

Smart cards look and feel like credit cards, but have one important difference: they have a 'programmable' microchip embedded. Their uses are extremely varied but, for information security, the are often used not only to authenticate the holder, but also to present the range of functions associated with that user's profile.

Smart Cards will often have an associated PIN number or password to provide a further safeguard. The main benefits of using Smart Cards is that their allocation can be strictly controlled, they are hard to forge and are required to be physically inserted into a 'reader' to initiate the authenticate process.

SRAM FPGA

FPGA (See FPGA) Utilizing SRAM (Static Random Access Memory) technology to make the interconnect. SRAM FPGAs are reprogrammable, volatile, and require a boot-up (see Boot-up) process to initialize. SRAM FPGAs are not secure.



Tamper resistant packaging

Often used in smart card systems tamper resistant packaging is designed to render electronics inoperable if the product is physically (invasively) attacked.

Techno Crime

Techno Crime is the term used by law enforcement agencies to denote criminal activity that uses (computer) technology, not as a tool to commit the crime, but as the subject of the crime itself. Techno Crime is usually pre-meditated and results in the deletion, corruption, alteration, theft, or copying of data on an organization's systems.

Techno Criminals will usually probe their prey system for weaknesses and will almost always leave an electronic 'calling card' to ensure that their pseudonym identity is known.

Techno Vandalism

Techno Vandalism is a term used to describe a hacker or cracker who breaks into a computer system with the sole intent of defacing and or destroying its contents. Techno Vandals can deploy 'sniffers' on the Internet to locate soft (insecure) targets and then execute a range of commands using a variety of protocols towards a range of ports.The best weapon against such attacks is a firewall which will hide and disguise your organization's presence on the Internet.





Virus

A virus is a form of malicious code and, as such it is potentially disruptive. It may also be transferred unknowingly from one computer to another. The term virus includes all sort of variations on a theme, including the nastier variants of macro-viruses, Trojans, and Worms, but, for convenience, all such programs are classed simply as 'virus.'

Viruses are a very real problem for both organisation and individual computer users. At the present time there are very few, if any, viruses that affect large computers, primarily because the programming languages that those systems use are not the same as those used to write virus code. Viruses, therefore are a problem primarily for users of PCs and servers.

As at January 2001, there were over 48,000 known viruses. Fortunately, the great majority of these are classed as 'rare' and usually appear only in virus research center files. However, that still leaves nearly 5,000 viruses, classed as 'common,' roaming the world's computer networks.

Volatile

Inability of an SRAM-based FPGA to maintain its configuration when power is removed.









http://www.actel.com/products/rescenter/security/