Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
34 Cards in this Set
- Front
- Back
- 3rd side (hint)
Defense in Depth |
Employing multiple layers of controls to avoid a single point of failure. |
|
|
Time-based Model of Security |
Implementing a combination of preventive, detective, and corrective controls that protect information assets long enough to enable an organization to recognize that an attack is occurring and take steps to thwart it before any information is lost or compromised. |
|
|
Social Engineering |
Using deception to obtain unauthorized access to information resources. |
|
|
Authentication |
Verifying the identity of the person or device attempting to access the system. |
|
|
Biometric Identifier |
A physical or behavioral characteristic that is used as an authentication credential. |
|
|
Multifactor Authentication |
The use of two or more types of authentication credentials in conjunction to achieve a greater level of security. |
Ex: finger print, password, and badge |
|
Multimodal Authentication |
The use of multiple authentication credentials of the same type to achieve a greater level of security. |
Ex: password & user ID |
|
Authorization |
The process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform. |
|
|
Access Control Matrix |
A table used to implement authorization controls. |
|
|
Compatibility Test |
Matching the users' authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action. |
|
|
Border Router |
A device that connects an organization's information system to the internet. |
|
|
Firewall |
A special-purpose hardware device or software running a general-purpose computer that controls both inbound and outbound communication between a system behind the firewall and other networks. |
|
|
Demilitarized Zone (DMZ) |
A separate network located outside the organization's internal information system that permits controlled access from the internet. |
|
|
Routers |
Special purpose devices that are designed to read the source and destination address fields in IP packet headers to decide where to send (route) the packet next. |
|
|
Access Control List (ACL) |
A set of IF-THEN rules used to determine what to do with arriving packets. |
|
|
Packet Filtering |
A process that uses various fields in a packet IP and TCP headers to decide what to do with the packet. |
|
|
Deep Packet Inspection |
A process that examines the data in the body of a TCP packet to control traffic rather than looking only at the information in the IP and TCP headers. |
|
|
Intrusion Prevention Systems |
Software or hardware that monitors patterns in the traffic flow to identify and automatically block attacks. |
|
|
Remote Authentication Dial-in User Service (RADIUS) |
A standard method for verifying the identity of users attempting to connect via dial in access. |
|
|
War Dialing |
Searching for an idle modem by programming a computer to dial thousands of phone lines. |
Used to detect employees setting up unsecured/unauthorized modems into the business network. |
|
Endpoints |
Collective terms for the workstations servers printers and other devices that comprise an organization's network. |
|
|
Vulnerabilities |
Flaws in programs that can be exploited to either crash the system or take control of it. |
|
|
Vulnerability Scanners |
Automated tools designed to identify whether a given system possesses any unused and unnecessary programs that represent potential security threats. |
|
|
Hardening |
The process of modifying the default configuration of endpoints to eliminate unnecessary settings and services. |
|
|
Change Control and Change Management |
The formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability. |
|
|
Log Analysis |
The process of examining logs to identify evidence of possible attacks. |
|
|
Intrusion Detection Systems (IDS) |
A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions. |
|
|
Penetration Test |
An authorized attempt to break into the organization's information system. |
|
|
Computer Incident Response Team (CIRT) |
A team that is responsible for dealing with major security incidents. |
|
|
Expoit |
A program designed to take advantage of a known vulnerability. |
|
|
Patch |
Code released by software developers that fixes a particular vulnerability. |
|
|
Patch Management |
The process of regularly applying patches and updates to software. |
|
|
Virtualization |
Running multiple systems simultaneously on one physical computer. |
|
|
Cloud Computing |
Using a browser to remotely access software, data storage, hardware, and applications. |
|