Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
51 Cards in this Set
- Front
- Back
time-based model of secutiry
|
focuses on the relationship between preventive, detective, and corrective controls. P > D+C
|
|
defense-in-depth
|
is to employ multiple laters of controls in order to avoid having a single point of failure.
|
|
Authentication
|
focuses on verifying the identity of the person or device attempting to access the system.
|
|
biometric identifier
|
device which reads some physical characteristic of an individual, such as their fingerprint or voice.
|
|
multifactor authentication
|
the use of two or more methods of authentication in conjuction.
|
|
Authorization
|
restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform.
|
|
access control matrix
|
a table specifying which portions of the system users are permitted to access and what actions they can perform.
|
|
compatibility test
|
matching the user's authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource.
|
|
Social Engineering
|
use of deception to obtain unauthorized access to information resources.
|
|
border router
|
connects an organization's information system to the internet.
|
|
firewall
|
either a special-purpose hardware device or software running on a general purpose computer. Controls traffic in and out of a system.
|
|
Demilitarized Zone (DMZ)
|
a separate network that permits controlled access from the internet to selected resources.
|
|
Transmission Control Protocol (TCP)
|
specifies the procedures for dividing files and documents into packets to be sent over the internet and methods for reassembly of the original document or file at the destination
|
|
Internet Protocol (IP)
|
specifies the structure of those packets and how to route them to the proper destination
|
|
routers
|
are designed to read the destination addres fields in IP packet headers to decide where to send the packet next.
|
|
Access Control List (ACL)
|
determines which packets are allowed entry and which are dropped.
|
|
static packet filtering
|
screening of individual IP packets based solely on the contents of the source and or destination fileds in the IP packet header.
|
|
Stateful Packet Filtering
|
aintains a table that lists all established connections between the organization's computers and the internet. checks packets against open connections to verify if they are initiated by an internal computer.
|
|
Deep packet filtering
|
inspection of the full body of a packet to control packet access and distribution.
|
|
intrusion prevention system (IPS)
|
desinged to identify and drop packets that are part of an attack.
|
|
Remote Authentication Dial-In User Service (RADIUS)
|
system to permit employees to remotely access the organizational network by dialing in with a modem. User Authentication also takes place.
|
|
war dialing
|
calling of every telephone number assigned to an organization to identify those whicha re connected to modems.
|
|
vulnerability
|
flaws or weaknesses which can be exploited to either crash the system or take control of it.
|
|
hardening
|
turning off of unneccesary features to reduce vulnerabilities
|
|
Encryption
|
is the process of transforming normal text, called Plaintext, into unreadable gibberish, called ciphertext.
|
|
Plain Text
|
Normal text
|
|
ciphertext
|
encrypted text
|
|
Decryption
|
reversal of the encryption process to get plaintext
|
|
key escrow
|
making copies of all encryption keys used by empolyees and storing those copies securely.
|
|
Symmetric encryption system
|
use the same key both to encrypt and to decrypt. DES and AES
|
|
Asymmetric encryption system
|
use two separate keys. Public and private keys. RSA and PGP
|
|
public key
|
a widely distributed key which is available to the public.
|
|
private key
|
a secret key and known only to the owner of that pair of keys.
|
|
hashing
|
a process that takes plaintext of any length and transforms it into a short code called a hash. non-reversible
|
|
digital signature
|
information encrypted with the creator's private-key. proves the author of a document or file.
|
|
digital certificate
|
is an electronic document, created and digitally signed by a trusted third party, that certifies the identity of the owner of a particular public key.
|
|
certificate authority
|
the organization that issues public and private keys and records the public key in a digital certificate.
|
|
e-signature
|
a cursive style imprint of a person's name that is applied to an electronic document.
|
|
log analysis
|
the process of monitoring logs to monitor security
|
|
Intrusion Detection System (IDS)
|
create logs of network traffic that was permitted to pass the firewall and then alanyze those logs for signs of attempted or successful intrusions.
|
|
vulnerability scans
|
use automated tools designed to identify whether a given system possesses any well-known vulnerabilities.
|
|
penetration test
|
an authorized attempt by either an internal audit team or an external security consulting firm to break into the organization's information system.
|
|
Computer Emergency Response Team (CERT)
|
responsible for dealing with major computer secutiry incidents.
|
|
exploit
|
a set of instructions for taking advantage of a vulnerability
|
|
patch
|
code released by software developers that fixes a particular vulnerability
|
|
patch management
|
the process for regularly applying patches and updates to all software used by the organization.
|
|
CERT steps
|
recognize a problem - Contain the problem - recover from the problem - follow-up on the problem.
|
|
Encryption Strength Components
|
key length - key management policies - nature of the encryption algorithm
|
|
hosting areas of attention
|
host configuration - user accounts - software design
|
|
Trust Services Framework Criteria
|
develop and document policies - effectively communicate policies - design and employ appropriate control procedures - monitor the system and take corrective action to maintain compliance.
|
|
TSF systems reliability
|
1. security 2. confidentiality 3. privacy 4. processing integrity 5. availability
|