Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/14

Click to flip

14 Cards in this Set

  • Front
  • Back
Preventive Authentication
verifies who a person is, something a person knows, something a person has, some biometric characteristic, combination of them
Preventive authorization
determines what a person can access
Preventive access control matrix
employee attempts to access a particular information system resource the system performs a compatibility test tath matches the user's authentication credentials against the access control matrix to determine whether theat employee should be allowed to access that resource and perform the requested action
Preventive awareness training
training all employees that access the system how to prevent leak of confidential information and social engineering
Preventive biometrics
finger print, eye scan, palm scan
Preventive physical access controls
locks, guards
Preventive firewall
software or hardware used to filter information
Preventive intrusion detection system
consists of a set of sensors and a central monitoring unit that creates logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions
Preventive intrusion prevention system
monitors patterns in the traffic flow, rather than only inspecting individual packets, to identify and automatically block attacks
Detective log analysis
process of examining logs to identify evidence of possible attacks
Detective intrusion detection
sensors and a central monitor unit that creates logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted of successful intrusions
Detective
managerial reports, security testing
corrective
computer incident response team, chief information security officer, independent responsibility for information security assigned to someone at an appropriate senior level
corrective patch management
fix known vulnerabilities by installing the latest updates