Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
34 Cards in this Set
- Front
- Back
Access list
|
a record or list of individuals who have permission to enter a secure area, the time that they entered and the time they left the area
|
|
access log
|
A log that can provide details regarding request for specif files on a system
|
|
anti-spyware
|
Software that helps prevent computers from becoming infected by different types of spyware
|
|
anti-virus(AV):
|
Software that can examine a computer for any infections as well as monitor computer activities and scan new documents that might contain a virus.
|
|
audit log
|
A log that can track user authentication attempts
|
|
audit records:
|
Logs that are the second common type of security-related operating system logs
|
|
Bayesian filtering:
|
Spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if it is spam.
|
|
cable lock
|
a device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen.
|
|
closed-circuit television(cctv):
|
Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring.
|
|
cross-site request forgery(xsrf)
|
an attack that uses the users web browser settings to impersonate the user.
|
|
data loss prevention (DLP):
|
A system that can identify critical data, monitor how it is being accessed and protect it from unauthorized users.
|
|
deadbolt lock:
|
A door lock that extends a solid metal bar into the door frame for extra security
|
|
errors(exceptions):
|
Faults in a program that occur while the application is running.
|
|
event logs:
|
logs that can document any unsuccessful events and the most significant successful events.
|
|
fencing:
|
Securing a restricted area by erecting a barrier
|
|
Firewall (packet fileter)
|
Hardware or software that is designed to prevent malicious packets from entering or leaving computers.
|
|
fuzz testing (fuzzing):
|
A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.
|
|
GPS tracking:
|
Using the Global Positioning System (GPS) to detect the location of a portable device.
|
|
heuristic detection:
|
Creating a virtualized environment to simulate the central processing unit (CPU) and memory of the computer to check for the presence of a virus.
|
|
host-based software firewall:
|
A firewall that runs as a program on a local system to protect it against attacks.
|
|
hotfix
|
Software that addresses a specific customer situation and often may not be distributed outside the customers organization.
|
|
input validation:
|
Verifying a user's input to an application
|
|
locking cabinet:
|
A secure storage unit that can be used for storing portable devices.
|
|
log:
|
A record of events that occur.
|
|
mantrap:
|
A device that monitors and controls two interlocking doors to a small room( a verstible), designed go separate secure and nonsecure areas.
|
|
patch
|
A general software security update intended to cover vulnerabilities that have been discovered.
|
|
pop-up blocker
|
Either a program or a feature incorporated within a browser that stops pop-up advertisements from appearing.
|
|
proximity reader:
|
A device that detects an emittedd ordto identify the owner.
|
|
remote wipe/Sanitation:
|
A technology that can remotely erase data from a portable device and reset it to its default settings
|
|
safe:
|
a rugged steal box with a lock
|
|
securuty logs
|
Logs that are considered the primary source of long data.
|
|
service pack:
|
Software that is a cumulative package of all security updates plus additional features
|
|
signature file:
|
A sequence of bytes( a string) found in the virus as a virus signature
|
|
voice encryption:
|
Using encryption to mask the content of voice communications
|