• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/51

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

51 Cards in this Set

  • Front
  • Back
time-based model of secutiry
focuses on the relationship between preventive, detective, and corrective controls. P > D+C
defense-in-depth
is to employ multiple laters of controls in order to avoid having a single point of failure.
Authentication
focuses on verifying the identity of the person or device attempting to access the system.
biometric identifier
device which reads some physical characteristic of an individual, such as their fingerprint or voice.
multifactor authentication
the use of two or more methods of authentication in conjuction.
Authorization
restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform.
access control matrix
a table specifying which portions of the system users are permitted to access and what actions they can perform.
compatibility test
matching the user's authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource.
Social Engineering
use of deception to obtain unauthorized access to information resources.
border router
connects an organization's information system to the internet.
firewall
either a special-purpose hardware device or software running on a general purpose computer. Controls traffic in and out of a system.
Demilitarized Zone (DMZ)
a separate network that permits controlled access from the internet to selected resources.
Transmission Control Protocol (TCP)
specifies the procedures for dividing files and documents into packets to be sent over the internet and methods for reassembly of the original document or file at the destination
Internet Protocol (IP)
specifies the structure of those packets and how to route them to the proper destination
routers
are designed to read the destination addres fields in IP packet headers to decide where to send the packet next.
Access Control List (ACL)
determines which packets are allowed entry and which are dropped.
static packet filtering
screening of individual IP packets based solely on the contents of the source and or destination fileds in the IP packet header.
Stateful Packet Filtering
aintains a table that lists all established connections between the organization's computers and the internet. checks packets against open connections to verify if they are initiated by an internal computer.
Deep packet filtering
inspection of the full body of a packet to control packet access and distribution.
intrusion prevention system (IPS)
desinged to identify and drop packets that are part of an attack.
Remote Authentication Dial-In User Service (RADIUS)
system to permit employees to remotely access the organizational network by dialing in with a modem. User Authentication also takes place.
war dialing
calling of every telephone number assigned to an organization to identify those whicha re connected to modems.
vulnerability
flaws or weaknesses which can be exploited to either crash the system or take control of it.
hardening
turning off of unneccesary features to reduce vulnerabilities
Encryption
is the process of transforming normal text, called Plaintext, into unreadable gibberish, called ciphertext.
Plain Text
Normal text
ciphertext
encrypted text
Decryption
reversal of the encryption process to get plaintext
key escrow
making copies of all encryption keys used by empolyees and storing those copies securely.
Symmetric encryption system
use the same key both to encrypt and to decrypt. DES and AES
Asymmetric encryption system
use two separate keys. Public and private keys. RSA and PGP
public key
a widely distributed key which is available to the public.
private key
a secret key and known only to the owner of that pair of keys.
hashing
a process that takes plaintext of any length and transforms it into a short code called a hash. non-reversible
digital signature
information encrypted with the creator's private-key. proves the author of a document or file.
digital certificate
is an electronic document, created and digitally signed by a trusted third party, that certifies the identity of the owner of a particular public key.
certificate authority
the organization that issues public and private keys and records the public key in a digital certificate.
e-signature
a cursive style imprint of a person's name that is applied to an electronic document.
log analysis
the process of monitoring logs to monitor security
Intrusion Detection System (IDS)
create logs of network traffic that was permitted to pass the firewall and then alanyze those logs for signs of attempted or successful intrusions.
vulnerability scans
use automated tools designed to identify whether a given system possesses any well-known vulnerabilities.
penetration test
an authorized attempt by either an internal audit team or an external security consulting firm to break into the organization's information system.
Computer Emergency Response Team (CERT)
responsible for dealing with major computer secutiry incidents.
exploit
a set of instructions for taking advantage of a vulnerability
patch
code released by software developers that fixes a particular vulnerability
patch management
the process for regularly applying patches and updates to all software used by the organization.
CERT steps
recognize a problem - Contain the problem - recover from the problem - follow-up on the problem.
Encryption Strength Components
key length - key management policies - nature of the encryption algorithm
hosting areas of attention
host configuration - user accounts - software design
Trust Services Framework Criteria
develop and document policies - effectively communicate policies - design and employ appropriate control procedures - monitor the system and take corrective action to maintain compliance.
TSF systems reliability
1. security 2. confidentiality 3. privacy 4. processing integrity 5. availability