Page 283 - CISSO_Prep_ Guide
P. 283

•  View-based access controls = security through
                   views.
               •  Knowledge discovery in databases (KDD) =
                   method of identifying valid and useful patterns
                   in data.  Some use Artificial Intelligence (AI).
                       ▪  Types
                              •  Probabilistic approach.
                              •  Statistical approach.
                              •  Classification approach.
                              •  Deviation and trend analysis.
                              •  Neural networks.
                              •  Expert system approach =
                                 algorithms that infer new facts
                                 from knowledge.
                              •  Hybrid approach.
                       ▪  External consistency = You should verify
                          decisions based on expected outcomes.
               •  Object reuse = an object may contain sensitive
                   residual data.
               •  Garbage collection = de-allocation of storage
                   following and during program execution.
                   Garbage collection is to RAM as defragging is to
                   a hard drive.
               •  Trap doors/back doors = hidden mechanisms
                   that bypass authentication measures.
               •  Time of Check / Time of Use (TOC/TOU) =
                   Security risk that exploits the discrepancy of
                   when a security function checks the contents
                   and when the variables are actually used.  For
                   example, if a logged-in user’s account is
   278   279   280   281   282   283   284   285   286   287   288