Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
31 Cards in this Set
- Front
- Back
Time based model of security |
Implementing a combination of preventive, detective, and corrective controls that protect information assets long enough to recognize that a certain attack is occurring and take steps to thwart it before any information is lost or compromised |
|
Defense in depth |
Employing multiple layers of controls to avoid a single point-of-failure |
|
Authentication |
Verifying the identity of the person or device attempting to access the system. |
|
Biometric identifier |
A physical or behaviorial characteristic that is used as an authentication credential |
|
Multifactor authentication |
The use of two or more types of authentication credentials in conjunction to achieve a greater level of security. |
|
Multimodal authentification |
The use of multiple authentication credentials of the same type to achieve a greater level of security. |
|
Authorization |
The process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform. |
|
Access control matrix |
A table used to implement authorization controls |
|
Compatibility test |
Matching the users authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action. |
|
Penetration test |
An authorized attempt to break into the organizations information system. |
|
Change control and change management |
The formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability. |
|
Border router |
A device that connects an organizations information system to the internet. |
|
Firewall |
A special purpose hardware device or software running a general-purpose computer that controls both inbound and outbound communication between the system behind the firewall and other networks. |
|
Demilitarized zone |
A seperate network located outside the organizations internal information system that permits controlled access from the internet. |
|
Routers |
Special purpose devices that are designed to read the source and destination address fields in IP packet headers to decide where to send the packet next. |
|
Access control list |
A set of IF-THEN rules used to determine what to do with arriving packets. |
|
Packet filtering |
A process that uses various fields in a packets IP and TCP headers to decide what to do with the packet. |
|
Deep pocket inspection |
A process that examines the data in the body of a TCP packet to control traffic, rather than looking only at the information in the IP and TCP headers. |
|
Intrusion prevention systems |
Software or hardware that monitors patterns in the traffic flow to identify and automatically block attacks. |
|
Endpoints |
Collective term for the workstations, servers, printers, and other devices that comprise an organizations network. |
|
Vulnerabilities |
Flaws in programs that can be exploited to either crash the system or take control of it. |
|
Vulnerability scanners |
Automated tools designed to identify whether a given system processes any unused and unnecessary programs that represent potential security threats. |
|
Exploit |
A program designed to take advantage of a known vulnerability. |
|
Patch |
Code released by software developers that fixes a particular vulnerability. |
|
Patch management |
The process of regularly applying patches and updates to software. |
|
Hardening |
The process of modifying the default configuration of endpoints to eliminate unnecessary settings and services. |
|
Log analysis |
The process of examining logs to identify evidence of possible attacks. |
|
Intrusion detection systems |
A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions. |
|
Computer incident response team |
A team that is responsible for dealing with major security incidents. |
|
Virtualization |
Running multiple systems simultaneously on one physical computer. |
|
Cloud computing |
Using a browser to remotely access software, data storage, hardware, and applications. |