Page 283 - CISSO_Prep_ Guide
P. 283
• View-based access controls = security through
views.
• Knowledge discovery in databases (KDD) =
method of identifying valid and useful patterns
in data. Some use Artificial Intelligence (AI).
▪ Types
• Probabilistic approach.
• Statistical approach.
• Classification approach.
• Deviation and trend analysis.
• Neural networks.
• Expert system approach =
algorithms that infer new facts
from knowledge.
• Hybrid approach.
▪ External consistency = You should verify
decisions based on expected outcomes.
• Object reuse = an object may contain sensitive
residual data.
• Garbage collection = de-allocation of storage
following and during program execution.
Garbage collection is to RAM as defragging is to
a hard drive.
• Trap doors/back doors = hidden mechanisms
that bypass authentication measures.
• Time of Check / Time of Use (TOC/TOU) =
Security risk that exploits the discrepancy of
when a security function checks the contents
and when the variables are actually used. For
example, if a logged-in user’s account is