• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/34

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Defense in Depth

Employing multiple layers of controls to avoid a single point of failure.

Time-based Model of Security

Implementing a combination of preventive, detective, and corrective controls that protect information assets long enough to enable an organization to recognize that an attack is occurring and take steps to thwart it before any information is lost or compromised.

Social Engineering

Using deception to obtain unauthorized access to information resources.

Authentication

Verifying the identity of the person or device attempting to access the system.

Biometric Identifier

A physical or behavioral characteristic that is used as an authentication credential.

Multifactor Authentication

The use of two or more types of authentication credentials in conjunction to achieve a greater level of security.

Ex: finger print, password, and badge

Multimodal Authentication

The use of multiple authentication credentials of the same type to achieve a greater level of security.

Ex: password & user ID

Authorization

The process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform.

Access Control Matrix

A table used to implement authorization controls.

Compatibility Test

Matching the users' authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action.

Border Router

A device that connects an organization's information system to the internet.

Firewall

A special-purpose hardware device or software running a general-purpose computer that controls both inbound and outbound communication between a system behind the firewall and other networks.

Demilitarized Zone (DMZ)

A separate network located outside the organization's internal information system that permits controlled access from the internet.

Routers

Special purpose devices that are designed to read the source and destination address fields in IP packet headers to decide where to send (route) the packet next.

Access Control List (ACL)

A set of IF-THEN rules used to determine what to do with arriving packets.

Packet Filtering

A process that uses various fields in a packet IP and TCP headers to decide what to do with the packet.

Deep Packet Inspection

A process that examines the data in the body of a TCP packet to control traffic rather than looking only at the information in the IP and TCP headers.

Intrusion Prevention Systems

Software or hardware that monitors patterns in the traffic flow to identify and automatically block attacks.

Remote Authentication Dial-in User Service (RADIUS)

A standard method for verifying the identity of users attempting to connect via dial in access.

War Dialing

Searching for an idle modem by programming a computer to dial thousands of phone lines.

Used to detect employees setting up unsecured/unauthorized modems into the business network.

Endpoints

Collective terms for the workstations servers printers and other devices that comprise an organization's network.

Vulnerabilities

Flaws in programs that can be exploited to either crash the system or take control of it.

Vulnerability Scanners

Automated tools designed to identify whether a given system possesses any unused and unnecessary programs that represent potential security threats.

Hardening

The process of modifying the default configuration of endpoints to eliminate unnecessary settings and services.

Change Control and Change Management

The formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability.

Log Analysis

The process of examining logs to identify evidence of possible attacks.

Intrusion Detection Systems (IDS)

A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions.

Penetration Test

An authorized attempt to break into the organization's information system.

Computer Incident Response Team (CIRT)

A team that is responsible for dealing with major security incidents.

Expoit

A program designed to take advantage of a known vulnerability.

Patch

Code released by software developers that fixes a particular vulnerability.

Patch Management

The process of regularly applying patches and updates to software.

Virtualization

Running multiple systems simultaneously on one physical computer.

Cloud Computing

Using a browser to remotely access software, data storage, hardware, and applications.