• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back

Time based model of security

Implementing a combination of preventive, detective, and corrective controls that protect information assets long enough to recognize that a certain attack is occurring and take steps to thwart it before any information is lost or compromised

Defense in depth

Employing multiple layers of controls to avoid a single point-of-failure

Authentication

Verifying the identity of the person or device attempting to access the system.

Biometric identifier

A physical or behaviorial characteristic that is used as an authentication credential

Multifactor authentication

The use of two or more types of authentication credentials in conjunction to achieve a greater level of security.

Multimodal authentification

The use of multiple authentication credentials of the same type to achieve a greater level of security.

Authorization

The process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform.

Access control matrix

A table used to implement authorization controls

Compatibility test

Matching the users authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action.

Penetration test

An authorized attempt to break into the organizations information system.

Change control and change management

The formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability.

Border router

A device that connects an organizations information system to the internet.

Firewall

A special purpose hardware device or software running a general-purpose computer that controls both inbound and outbound communication between the system behind the firewall and other networks.

Demilitarized zone

A seperate network located outside the organizations internal information system that permits controlled access from the internet.

Routers

Special purpose devices that are designed to read the source and destination address fields in IP packet headers to decide where to send the packet next.

Access control list

A set of IF-THEN rules used to determine what to do with arriving packets.

Packet filtering

A process that uses various fields in a packets IP and TCP headers to decide what to do with the packet.

Deep pocket inspection

A process that examines the data in the body of a TCP packet to control traffic, rather than looking only at the information in the IP and TCP headers.

Intrusion prevention systems

Software or hardware that monitors patterns in the traffic flow to identify and automatically block attacks.

Endpoints

Collective term for the workstations, servers, printers, and other devices that comprise an organizations network.

Vulnerabilities

Flaws in programs that can be exploited to either crash the system or take control of it.

Vulnerability scanners

Automated tools designed to identify whether a given system processes any unused and unnecessary programs that represent potential security threats.

Exploit

A program designed to take advantage of a known vulnerability.

Patch

Code released by software developers that fixes a particular vulnerability.

Patch management

The process of regularly applying patches and updates to software.

Hardening

The process of modifying the default configuration of endpoints to eliminate unnecessary settings and services.

Log analysis

The process of examining logs to identify evidence of possible attacks.

Intrusion detection systems

A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions.

Computer incident response team

A team that is responsible for dealing with major security incidents.

Virtualization

Running multiple systems simultaneously on one physical computer.

Cloud computing

Using a browser to remotely access software, data storage, hardware, and applications.