• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back
Preventive Authentication
verifies who a person is, something a person knows, something a person has, some biometric characteristic, combination of them
Preventive authorization
determines what a person can access
Preventive access control matrix
employee attempts to access a particular information system resource the system performs a compatibility test tath matches the user's authentication credentials against the access control matrix to determine whether theat employee should be allowed to access that resource and perform the requested action
Preventive awareness training
training all employees that access the system how to prevent leak of confidential information and social engineering
Preventive biometrics
finger print, eye scan, palm scan
Preventive physical access controls
locks, guards
Preventive firewall
software or hardware used to filter information
Preventive intrusion detection system
consists of a set of sensors and a central monitoring unit that creates logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions
Preventive intrusion prevention system
monitors patterns in the traffic flow, rather than only inspecting individual packets, to identify and automatically block attacks
Detective log analysis
process of examining logs to identify evidence of possible attacks
Detective intrusion detection
sensors and a central monitor unit that creates logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted of successful intrusions
Detective
managerial reports, security testing
corrective
computer incident response team, chief information security officer, independent responsibility for information security assigned to someone at an appropriate senior level
corrective patch management
fix known vulnerabilities by installing the latest updates