Shared Flashcard Set

Details

Introduction to fundementals of information systems security
n/a
54
Other
10th Grade
02/07/2012

Additional Other Flashcards

 


 

Cards

Term
Acceptable use policy(AUP)
Definition
Rules that were made by the transit networks to restrict the use to which network may be put
Term
Availabilty
Definition
Suitable or ready for use or service
Term
Biometric
Definition
noting or using a persons unique physical and other traits for the purpose of identification and security
Term
Blackberry
Definition
a brand of smartphone used for wireless e-mail
Term
Business continuity(BCP)
Definition
identifies an organizations exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization
Term
Certified information system security professional(CISSP)
Definition
independent information security certification governed by International Information Systems Security Certification Consortium also known as (ISC)². (ISC)² is a self-declared non-profit organization,[1] but is not a charitable organization under the applicable Internal Revenue Service's code.
Term
Childrens internet protection ACT (CIPA)
Definition
The Children's Internet Protection Act (CIPA) requires that K-12 schools and libraries in the United States use Internet filters and implement other measures to protect children from harmful online content as a condition for the receipt of certain federal funding
Term
Ciphertext
Definition
Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it.
Term
Cleartext
Definition
is information a sender wishes to transmit to a receiver. Cleartext is often used as a synonym.
Term
Confidentiality
Definition
Confidentiality of information, enforced in an adaptation of the military's classic "need to know" principle with both positive and negative consequences.
Term
Content filtering
Definition
is the technique whereby content is blocked or allowed based on analysis of its content, rather than its source or other criteria.
Term
Cryptography
Definition
is the result of encryption performed on plaintext using an algorithm, called a cipher.
Term
Cybersecurity
Definition
protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.
Term
Cyberspace
Definition
is the electronic medium of computer networks, in which online communication takes place
Term
Demilitarized zone(DMZ)
Definition
is an area, usually the frontier or boundary between two or more military powers (or alliances), where military activity is not permitted, usually by peace treaty, armistice, or other bilateral or multilateral agreement.
Term
Disaster recovery plan (DRP)
Definition
is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.
Term
Downtime
Definition
used to refer to periods when a system is unavailable
Term
E-commerce
Definition
refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks
Term
Network interface card(NIC)
Definition
this is the physical between a computer and the ethernet LAN. It contains a unique 6-byte MAC-layer address.
Term
Network keys
Definition
software encryption keys used for encrypting and decrypting keys.
Term
Network operations center(NOC)
Definition
the command control center for a telecommunications service provider's backbone network and customer networks. customer trouble calls are answered by the NOC in support of managed services and SLAs.
Term
Personal data assistant(PDA)
Definition
a handheld device that acts as a mobile computer device supporting cell phone, Internet browsing, and e-mail.
Term
Ping
Definition
stands for "packet internet groper." Ping uses the internet control message protocol(icmp) echo-request and echo-reply communications to verify end-to-end IP connectivity
Term
Protocol
Definition
A list of rules and methods for communicating.
Term
Proxy server
Definition
A server that is placed on a DMZ LAN that acts as a middleman for data sharing between the outside world and a user. proxy servers assume risk, threats, and vulnerabilities so that the workstations they're connected to don't have to.
Term
Recovery time objective(RTO)
Definition
a defined metric for how long it must take to recover an IT system, application, and data access.
Term
RFC 1087: Ethnics and the internet
Definition
an acceptable use policy statement as issued by the internet advisory board and the US gov't defining ethics and the internet.
Term
Risk
Definition
the likelihood that something bad will happen to an asset.
Term
Sarbanes-Okley Act(SOX)
Definition
A U.S. federal law requiring officers of publicly traded companies to have accurate and audited financial statements. SOX also requires proper security controls to protect financial records and insider information.
Term
Second-level authentication
Definition
A second authentication requirement for users to gain access to more sensitive applications and data.
Term
Secure Sockets Layer virtual private network(SSL-VPN)
Definition
SSL-VPN is a means of securing remote access to a secure Website. In other words, it's a VPN that runs on secure sockets layer and encrypts communication to a secure Web server via a secure browser connection.
Term
Service level agreement(SLA)
Definition
a contractual commitment by a service provider or support organization to its customers or users.
Term
Simple network management prototcol(SNMP)
Definition
a non-secure connectionless UDP-based protocol that is used to transmit network -management data between IP devices and an SNMP network manager.
Term
Smartphone
Definition
a cellphone that runs mobile communications software and supports voice, Internet browsing, e-mail, and text messaging.
Term
Software vulnerability
Definition
An error or bug in software codea that can be exploited
Term
Subnet mask address
Definition
the complement to an IP address that defines the IP network number and IP host address.
Term
Systems seurity certified practioner(SSCP)
Definition
a practitioner-level information systems security professional certification offered by (ISC)^2
Term
Telnet
Definition
A non-secure application that supports remote terminal access in cleartext transmission.
Term
Threat
Definition
Any action that could damage an asset.
Term
Token
Definition
A physical device that trnsmits a secret code to a user to authenticate the user. Can be a hardware-device token or a software generated token.
Term
Transmission Control Protocol/Internet Protocol(TCP/IP)
Definition
a popular suite of protocol that operate at both the Network and Transport layers of the OSI reference model. TCP/IP governs all activity across the internet and through most corporate and home networks.
Term
Trivial File Transfer Protocol(TFTP)
Definition
a connectionless, UDP-based file-transfer protocol used for quick and small file transfers between two IP devices.
Term
Trojan
Definition
A malicious software code that appears benign to the user but actually performs a task on behalf of a perpetrator with malicious intent.
Term
Uptime
Definition
The total amount of time the IT system application and data was accessible.
Term
Virtual LAN(VLAN)
Definition
the broadast domain in Ethernet where all workstations are on the same logical LAN.
Term
Virus
Definition
A software program that attaches itself to or copies itself into another program for the purpose of causing the computer to follow instructions that were not intended by the original program developer (infection)
Term
Vulnerability
Definition
A weakness that allows a threat to be realized or to have an asset.
Term
Vulnerability Assessment
Definition
a software review that identifies bugs or errors in software.
Term
Vulnerability Window
Definition
The gap in time between when a software vendor releases a software or security patch and when you implement it.
Term
Wireless Access Point(WAP)
Definition
A radio transceiver device that transmits and recieves IP communications via LAN technology
Term
Wireless Fidelity(WI-FI)
Definition
Term
Wireless LANs(WLANs)
Definition
Term
World Wide Web(WWW)
Definition
Term
Worm
Definition
Supporting users have an ad free experience!