Shared Flashcard Set

Details

CISSP Domain 7 2017
Domain 7
34
Other
Not Applicable
04/10/2017

Additional Other Flashcards

 


 

Cards

Term
Device that uses passive listening devices
Definition
Acoustic Sensors
Term
Accounts that are assigned only to named individuals that require administrative access to the system to perform maintenance activities, and should be different and separate from a user's normal account.
Definition
Administrator accounts
Term
Devices that use a magnetic field or mechanical contact to determine if an alarm signal is initiated
Definition
Balanced Magnetic Switch (BMS)
Term
The who, what, when, where, and how the evidence was handled—from its identification through its entire life cycle, which ends with destruction, permanent archiving, or returning ot owner.
Definition
Chain of custody
Term
A lock controlled by touch screen, typically 5 to 10 digits that when pushed in the right combination the lock will releases and allows entry
Definition
Cipher Lock
Term
A discipline for evaluating, coordinating, approving or disapproving, and implementing changes in artifacts that are used to construct and maintain software systems
Definition
Configuration management (CM)
Term
A suite of technologies aimed at stemming the loss of sensitive information that occurs in the enterprise.
Definition
Data Leak Prevention (DLP)
Term
The practice of monitoring and potentially restricting the flow of information outbound from one network to another
Definition
Egress filtering
Term
A focused infrared (IR) light beam is projected from an emitter and bounced off of a reflector that is placed at the other side of the detection area
Definition
Infrared Linear Beam Sensors
Term
Provide a quick way to disable a key by permitting one turn of the master key to change a lock
Definition
Instant Keys
Term
A technology that alerts organizations to adverse or unwanted activity
Definition
Intrusion Detection System (IDS)
Term
The party to party litigation costs resulting from its breach of warranties
Definition
Indemnification
Term
A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity.
Definition
Intrusion Prevention System (IPS)
Term
Decoy servers or systems setup to gather information regarding an attacker or intruder into your system
Definition
Honeypot
Term
A centralized collection of honeypots and analysis tools
Definition
Honeyfarm
Term
Two or more honeypots on a network
Definition
Honeynet
Term
Data that are dynamic and exist in running processes or other volatile locations (e.g., system/device RAM) that disappear in a relatively short time once the system is powered down
Definition
Live evidence
Term
States that when a crime is committed, the perpetrators leave something behind and take something with them, hence the exchange
Definition
Locard's exchange principle
Term
Consist of a magnetically sensitive strip fused onto the surface of a PVC material, like a credit card
Definition
Magnetic Stripe (mag stripe) cards
Term
A lock or latch that is recessed into the edge of a door, rather than being mounted to its surface.
Definition
Mortise Lock
Term
Accounts granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system, but where administrative access is not required
Definition
Power users
Term
Identifies any unacceptable deviation from expected behavior based on known network protocols
Definition
Protocol Anomaly-Based IDS
Term
Use embedded antenna wires connected to a chip within the card through RF.
Definition
Proximity Card (prox cards)
Term
Essential activities to protect business information and can be established in compliance with laws, regulations, or corporate governance
Definition
Records and Information Management (RIM)























Records and Information Management (RIM)
Term
The measure of the existing magnetic field on the media after degaussing
Definition
Remanence
Term
A lock or latch typically mounted on the surface of a door, typically associated with a dead bolt type of lock
Definition
Rim Lock
Term
A form of software virtualization that lets programs and processes run in their own isolated virtual environment
Definition
Sandboxing
Term
A group of technologies which aggregate information about access controls and selected system activity to store for analysis and correlation
Definition
Security Informatn and Event Management (SIEM)
Term
Accounts used to provide privileged access used by system services and core applications
Definition
Service accounts
Term
Credential cards with one or more microchip processing that accepts or processes infomraiton and can be contact or contact less.
Definition
Smart Cards
Term
Analyzes event data by comparing it to typical, known, or predicted traffic profiles in an effort to find potential security breaches
Definition
Statistical Anomaly-based IDS
Term
The science of hiding information
Definition
Steganography
Term
Identifies any unacceptable deviation from expected behavior based on actual traffic structure
Definition
Traffic anomaly-based IDS
Term
Send induced radio frequency (RF) signals down a cable that is attached to the fence fabric
Definition
Time domain Reflectometry (TDR)
Supporting users have an ad free experience!