Читаем CISSP Practice полностью

Galois message authentication code (GMAC)

Provides authenticated encryption and authenticated decryption for non-confidential data only. GMAC is a specialized GCM when the GCM input is restricted to data that is not be encrypted; and GMAC is simply an authentication mode on the input data.

Gateway

It is an interface between two networks and a means of communicating between networks. It is designed to reduce the problems of interfacing different networks or devices. The networks involved may be any combination of local networks that employ different level protocols or local and long-haul networks. It facilitates compatibility between networks by converting transmission speeds, protocols, codes, or security measures. Gateways operate in the application layer and transport layer of the ISO/OSI reference model.

General packet radio service (GPRS)

A packet switching enhancement to global system for mobile communications (GSM) and time division multiple access (TDMA) wireless networks to increase data transmission speeds.

General support system (GSS)

An interconnected information resource under the same direct management controls that share common functionality. It normally includes hardware, software, information, data, applications, communications, facilities, and people and provides support for a variety of users and/or applications. Individual applications support different mission-related functions. Users may be from the same or different organizations.

Generalized testing

A test methodology that assumes no knowledge of the internal structure and implementation detail of the assessment object. Also known as black-box testing.

Global positioning system (GPS)

(1) A system for determining position by comparing radio signals from several satellites. (2) A network of satellites providing precise location determination to receivers.

Global supply chain

A system of organizations, people, activities, information, and resources, international in scope, involved in moving products or services from supplier/producer to consumer/customer.

Global system for mobile communications (GSM)

A set of standards for second generation cellular networks currently maintained by the third generation partnership project (3GPP).

Gopher

A protocol designed to allow a user to transfer text or binary files among computer hosts across networks.

Graduated security

A security system that provides several levels (e.g., low, moderate, or high) of protection based on threats, risks, available technology, support services, time, human concerns, and economics.

Granularity

(1) An expression of the relative size of a data object. (2) The degree to which access to objects can be restricted. (3) Granularity can be applied to both the actions allowable on objects, as well as to the users allowed to perform those actions of the object. (4) The relative fineness or coarseness by which a mechanism can be adjusted. For example, protection at the file level is considered to be coarse granularity, whereas protection at the field level is considered to be of finer granularity. (5) The phrase “the granularity of a single user” means the access control mechanism can be adjusted to include or exclude any single user.

Graphical user interface (GUI)

A combination of menus, screen design, keyboard commands, command language, and help screens that together create the way a user interacts with a computer. Allows users to move in and out of programs and manipulate their commands by using a pointing device (often a mouse). Synonymous with user interface.

Gray box testing

A test methodology that assumes some knowledge of the internal structure and implementation detail of the assessment object. Focused testing is also known as gray box testing.

Grid computing

A form of distributed computing whereby a super virtual computer is composed of many networked and loosely coupled computers working together to perform very large tasks. The grid handles non-interactive workloads that involve a large number of files that are heterogeneous and geographically dispersed. Grids are constructed with middleware and software libraries, and the grid computers are connected to a network (that is, private, public, or the Internet) with a conventional network interface, such as Ethernet. There is an overlap between grid computing, distributed computing, parallel computing, and mesh computing (Wikipedia).

Group

A set of subjects.

Groupware

Software that recognizes the significance of groups by providing system functions to support the collaborative activities of work groups.

Guard (hardware and software)

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес