Term
|
Definition
| When organizations abopt levels of security for a legal defense, they may need to show that they have done any prudent org. would do. |
|
|
Term
| ARO (Annuanlized Rate of Occurrence |
|
Definition
| The anticipated rate of occurrence of a loss from the specified threat over one year. |
|
|
Term
|
Definition
The probablility that something can happen. ALSO RISK= the Likelihook of vulnerability occurence times value (or impact) - % risk |
|
|
Term
| Incident response plan (IR) |
|
Definition
| addresses the identification, classificaton, response, and recovery from an incident. |
|
|
Term
|
Definition
| The quantity and nature of risk that ORG are willing to accept. |
|
|
Term
| Military uses ?- Level classification scheme |
|
Definition
|
|
Term
|
Definition
| Is an executive-level doc that outlines the ORG's approach and attitude towards INFOSEC |
|
|
Term
| Management of classified data includes its storage and (3 answers) |
|
Definition
| Destruction, Distribution, Portability |
|
|
Term
|
Definition
In a Weighted Factor Analysis, each information asset is assigned a score of each critical factor. Page 128 |
|
|
Term
|
Definition
| Is the choice to do nothing to protect a vulnerability and to accept the oucome of its exploration. |
|
|
Term
|
Definition
| Data that any info or material the unathorized disclosure of which reasonably could be expected to cause damage to the national securtiy. |
|
|
Term
|
Definition
| Refers to the need to avoid failling behind the competition |
|
|
Term
|
Definition
| Address user acceptance and support, management acceptance and support, and the overall requirements of the ORG's stakeholders |
|
|
Term
Which infomation assets should be tracked? (3 answers) |
|
Definition
| Procedures, People, and Data |
|
|
Term
|
Definition
First phase of Risk Management Defined: The formal process of examining and documenting the security posture of an ORG's Into Tech and the risks it faces |
|
|
Term
| Issue-Specific Security Policy |
|
Definition
| IS a planning document that outlines the process of implementing security in the ORG. |
|
|
Term
|
Definition
| Is the process of applying safeguards to reduce the risks to an ORG's data and information systems. |
|
|
Term
| Disaster Recovery Plan (DRP) |
|
Definition
| Includes all preparations for the recovery process, startegies to limit losses during the disaster, and detailed steps to follow when the smoke clears. |
|
|
Term
|
Definition
| Is a row of attributes associated with a particular subject in the Lattic-Based Access Control Structure |
|
|
Term
|
Definition
| An authorized issued by an organization for the repair, modification, or update of a piece of equipment. |
|
|
Term
| Annualized Rate of Occurrence |
|
Definition
| The anticipated rate of occurrence of a loss from the specified threat over one year. |
|
|
Term
| Discretionary Access Control |
|
Definition
| A type of data access control in which data users are allowed to grant access to their peers. |
|
|
Term
|
Definition
| A private data network that makes use of public Telco with using privacy through the use of tunneling protocal |
|
|
Term
|
Definition
| The data within an IP packet is encrypted, but the header info is not. |
|
|
Term
|
Definition
| IE- Baston Host stands alone as a sole defender on the network perimeter. |
|
|
Term
|
Definition
| IS an intermediate area between a trusted network and an untrusted network |
|
|
Term
|
Definition
| Are systems that auth the credentials of users who are trying to access an org's net via dial-up |
|
|
Term
|
Definition
| Allows the firewall to react to an emergent evernt and update or create rules to deal with the event. |
|
|
Term
|
Definition
| Requires that the filtering rules governing how the firewall decides which packets are allowed and which are denied are developed and instatlled. |
|
|
Term
|
Definition
Generates Keys which issue a Key Session in Kerberos |
|
|
Term
| Ticket Granting Service (TGS) |
|
Definition
| Kerberos TGS provides tickets to clients who request servcies. |
|
|
Term
| Application Gateway is also known as? |
|
Definition
| Application-Level Firewall |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Is the dominate architecture used to secure network access today in large org's |
|
|
Term
|
Definition
| Examine every incoming packet header and can selectively filter packets based on header info such as destination address, source addy, packet type and other |
|
|
Term
| Point to Point Tunneling Protocal are used in what server type |
|
Definition
|
|
Term
|
Definition
| Keep track of each network connecton between internal and external systems |
|
|
Term
| Most common packet filters on firewalls |
|
Definition
| Direction- TCP or UDP source and Destination port request- IP source and Dest addy |
|
|
Term
|
Definition
|
|
Term
| Privilege Attribure Certificate (PAC) |
|
Definition
| In SESAME, the user is first Auth to an auth server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a PAC |
|
|
Term
|
Definition
| Operate at the media access control sub-layer of the data link layer of the OSI model |
|
|
Term
| What 2 impletmetion models are there for content filters |
|
Definition
|
|
Term
| Proxy server are oftent placed in an unsecure area called? |
|
Definition
|
|
Term
| There are _____ major processing-mode categories of firewalls. |
|
Definition
|
|
Term
| What protocal handels TCP traffic on a proxy server? |
|
Definition
|
|
Term
| What different versions of TACACS are there? |
|
Definition
| TACACS+, TACACS, Extended TACACS |
|
|
Term
| Access Controls can be ? (3 answers) |
|
Definition
| Discretionary, Mandatory, and nondiscretionary. |
|
|