Shared Flashcard Set

Details

Isys Ch. 7
Security
47
Accounting
Undergraduate 3
09/23/2010

Additional Accounting Flashcards

 


 

Cards

Term
Time-based model of security
Definition

Three fundamental information security concepts

2. the time-based model-focuses on the relationship between preventive, detective, and corrective controls

P>D+C

P=time it takes to break through

D=time it takes to detect

C=time it takes to respond

Term
Defense-in-depth
Definition

Three fundamental information security concepts

3. Defense-in-depth-to employ multiple layers of controls in order to avoid having a single point of failure.

Term
Authentication
Definition

Preventive controls

Authentication-focuses on verifying the identity of the person or device attempting to access the system.

Term
biometric identifier
Definition

Authentication control

Biometric identifier-verifying physical characteristics 

Term
multifactor identification
Definition

Authentication controls

multifactor-the use of two of all three methods in conjunction 

Term
Authorization
Definition

Preventive controls

Authorization control

authorization-restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform

Term
access control matrix 
Definition

authorization controls

access control matrix-a table specifying which portions of the system users are permitted to access and what actions they can perform

Term
compatibility test
Definition

authorization controls

compatibility test- matches the user's authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action

Term
social engineering
Definition

Preventive control

Training

social engineering- use deception to obtain unauthorized access to information resources

Term

border router

 

Definition

preventive

controlling remote access

border router-connects an organization's information system to the internet

Term
firewall
Definition

preventive 

controlling remote access

firewall-behind the router is the main firewall, which is a combination of security algorithms and router communications protocols that prevent outsiders from tapping into corporate databases and e-mail systems

Term
demilitarized zone (DMZ)
Definition

preventive

controlling remote access

DMZ-a separate network that permits controlled access from the Internet to selected resourced, such as the organization's e-commerce Web server

Term
Transmission Control Protocol
Definition

preventive

controlling remote access 

TCP-specifies the procedures for dividing files and documents into packets to be sent over the Internet and the methods for reassembly of the original documents of file at the destination

Term
Internet Protocol (IP)
Definition

preventive 

controlling remote access

IP-specifies the structure of those packets, TCP packets, and how to route them to the proper destination

Term
routers 
Definition

preventive 

controlling remote access

routers-are designed to read the destination address fields in IP packet headers to decide where to send (route) the packet next

Term
access control list
Definition

preventive 

controlling remote access

filtering packets

access control list (ACL)-set of rules that determine which packets are allowed entry and which are dropped

Term
static packet filtering
Definition

preventive

controlling remote access 

filtering packets

static packet filtering-border routers typically perform this. it screens individual IP packets based solely on the contents of the source and/or destination fields in the IP packet header

Term
deep packet inspection
Definition

preventive 

controlling remote access

deep packet inspection

deep packet inspection-When the firewall examines the data in the body of an IP packet rather than only looking at the information in the IP header

Term
intrusion prevention systems (IPS)
Definition

preventive

controlling remote access

deep packet inspection

IPS- new type of filter designed to identify and drop packets that are part of an attack

 

Term
Remote Authentication Dial-in User Service (RADIUS)
Definition

Preventive

controlling remote access

 Dial-up connection

RADIUS-a standard method for verifying the identity of users attempting to connect via dial-in access. Users connect to a remote access server and submit their login credentials. The remote access server passes those credentials to the RADIUS server, which performs compatibility tests to authenticate the identity of that user.

Term
war dialing
Definition

preventive

controlling remote access

dial-up connections

war dialing-searching for an idle modem by programming a computer to dial thousands of phone lines. Finding an idle modem often enables a hacker to gain access to the network to which it is connected. 

Term
hosts
Definition

preventive

controlling remote access

Host and application hardening

hosts-the workstations, servers, printers, and other devices that comprise the organization's network

Term
vulnerabilities
Definition

preventive 

controlling remote access

 hosts and  application hardening

preventive controls on 1) host configurations

 

vulnerabilities-flaws in programs that which can be exploited to either crash the system or take control of it

Term
hardening
Definition

preventive

controlling remote access

 hosts and application hardening

1) host configuration

 

hardening-the process of turning off unnecessary features 

Term
encryption
Definition

Preventive

controlling remote access

Encryption

 

Encryption-the process of transforming normal text, called plaintext, into unreadable, gibberish, called ciphertext. Encryption is particularly important when confidential data is being transmitted from remote terminals because data transmission lines can be electronically monitored without the user's knowledge.

Term
decryption
Definition
transforming cyphertext to plaintext
Term
key escrow
Definition

preventive

controlling remote access

encryption strength

 

key escrow-the process of storing a copy of an encryption key in a secure location

Term
symmetric encryption system
Definition
Encryption systems that use the same key both to encrypt and to decrypt
Term
asymmetric encryption systems
Definition
a public key that publicly available and a private key that is kept secret and known only by the owner of that pair of keys. Either key, can be used to encode a message, but only the other key in that public-private pair can be used to decode that message.
Term
hashing
Definition
A process that takes plaintext of any length and transforms it into a short code called a hash
Term
digital signature
Definition
1) a piece of data signed on a document by a computer. A digital signature cannot be forged and is useful in tracing authorization. 2) Information encrypted with the creator's private key.
Term
digital certificate
Definition
An electronic document, created and digitally signed by a trusted third party, that certifies the identity of the owner of a particular public key. The digital certificate contains that party's public key. Thus, digital certificates provide an automated method for obtaining an organization's or individual's public key.
Term
Public key infrastructure (PKI)
Definition
An approach to encryption that uses two keys: a public key that is publicly available and a private key that is kept secret and known only by the owner of that pairs of keys. With PKI, either key (the public or private) can be used to encode a message, but only the other key in that public-private pair can be used to decode that message
Term
certificate authority
Definition
An independent organization that issues public and private keys and records the public key in a digital certificate. 
Term
e-signature
Definition
cursive-style imprint of a person't name that is applied to and electronic document.
Term
Log analysis
Definition

Detective Controls

 

log analysis-the process of examining logs to monitor security

Term
Intrusion Detection Systems (IDS)
Definition
A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions.
Term
vulnerability scans
Definition

detective controls

security testing

 

vulnerability scans-automated tools designed to identify whether a given system possesses any well-known vulnerabilities

Term
penetration test
Definition

detective

security testing

 

penetration test- an authorized attempt by either an internal audit team or an external security consulting firm to break into the organization's information security.

Term
computer emergency response team (CERT)
Definition

Corrective Controls

 

CERT-a team responsible for dealing with major security incidents

Term
expoit
Definition

corrective controls

patch management

 

exploit-the set of instructions for taking advantage of a vulnerability

Term
patch
Definition

corrective

patch management

 

patch-code released by software developers that fixes a particular vulnerability

Term
patch management
Definition

corrective

 

patch management-the process of regularly applying patches and updates to software used by the organization 

Supporting users have an ad free experience!