Shared Flashcard Set

Details

Ch. 1 - Net Auth
Ch. 1 - Net Auth
28
Other
Undergraduate 3
04/06/2011

Additional Other Flashcards

 


 

Cards

Term
Intrusion Prevention System
Definition
Provides real-time detection of certain types of attacks while they are in progress.
Term
Intrusion Prevention System
Definition
Able to detect malicious activity and automatically block the attack in real-time.
Term
Firewall
Definition
Prevents undesirable traffic form entering prescribed areas within a network
Term
Encryption
Definition
Hiding communications from anyone other than the intended user
Term
Spoofing
Definition
Attacks in which one device poses as another by falsifying data
Term
Denial of Service
Definition
Attacks that make computer resources unavailable to intended users.
Term
confidentiality
Definition
Prevent the unauthorized disclosure of sensitive information.
Term
Integrity
Definition
Protect Information or processes from unauthorized or accidental modification
Term
Availability
Definition
Information is accessible by authorized users when needed
Term
3 Well Known Security Organizations
Definition
1. SysAdmin, Audit, Network, Security Institute
2. Computer Emergency Response Team
3. INternational Information Systems Security Certification Consortium
Term
Risk Assessment
Definition
Determine the quantitative and qualitative value of risk
Term
Security Policy
Definition
Document that describes the restriction on member behaviors and what information may be accessed by whom
Term
Organization of Information Security
Definition
The governance model for information security
Term
Asset Management
Definition
inventory and classification scheme for information assets
Term
Human Resources Security
Definition
Security related to people joining, moving and leaving an organization
Term
Physical and Environment Security
Definition
Protection of the computer facilities in an organization
Term
Communications and Operations Management
Definition
Managing the security controls in systems and networks
Term
Access control
Definition
Restriction of access rights to the organization's assets.
Term
Information Systems Acquisition, Development and Maintenance
Definition
Integrating security into applications
Term
Information Security Incident Management
Definition
How to anticipate and respond to information security breaches
Term
Business continuity Management
Definition
Protection, maintenance and recover of business-critical processes and systems.
Term
Compliance
Definition
Ensuring conformance with information security policies, standards, and regulations
Term
Virus
Definition
Software which attaches to another program to execute a specific unwanted function on a computer
Term
Worm
Definition
Executes code and installs copies of itself in the memory of the infected computer, which then infects other hosts
Term
trojan horse
Definition
An application written to look like something else. When it is opened, it attacks teh end-user computer from within
Term
Enabling Vulnerability
Definition
A vulnerability on a system that the worm exploits
Term
Propagation Mechanism
Definition
The method by which the code replicates itself and locates new targets
Term
Payload
Definition
Any malicious code that results in some action
Supporting users have an ad free experience!