Shared Flashcard Set

Details

ITEC CH5
ITEC CH5
76
Computer Science
Undergraduate 4
02/16/2013

Additional Computer Science Flashcards

 


 

Cards

Term
Access List
Definition
A record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area
Term
Access Log
Definition
A log that can provide details regarding requests for specific files on a system
Term
Anti-spyware
Definition
software that helps prevent computers from becoming infected by different types of spyware
Term
AV
anti-virus
Definition
Software that can examine a computer for any infections as well as monitor computer activity and scan documents that might contain a virus
Term
audit log
Definition
a log that can track user authentication attempts
Term
audit records
Definition
logs that are the second common type of security related operating system logs
Term
Bayesian filtering
Definition
Spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if it is spam
Term
cable lock
Definition
a device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen
Term
CCTV
Closed Circuit Television
Definition
Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring
Term
XSRF
Cross-site request forgery
Definition
An attack that uses the user's web browser settings to impersonate the user
Term
DLP
Data loss prevention
Definition
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users
Term
deadbolt lock
Definition
a door lock that extends a solid metal bar into the door frame for extra security
Term
errors
(exceptions)
Definition
faults in a program that occur while the application is running
Term
event logs
Definition
logs that can document any unsuccessful events and the most significant successful events
Term
fencing
Definition
securing a restricted area by erecting a barrier
Term
firewall
(packet filter)
Definition
hardware or software that is designed to prevent malicious packets from entering or leaving computers
Term
fuzz testing
(fuzzing)
Definition
a software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program
Term
GPS tracking
Definition
using the global positioning system to detect the location of a portable device
Term
heuristic detection
Definition
creating a virtualized environment to simulate the central processing unit and memory to check for the presence of a virus
Term
host-based software firewall
Definition
a firewall that runs as a program on a local system to protect it against attacks
Term
hotfix
Definition
software that addresses a specific customer situation and often may not be distributed outside that customers organization
Term
input validation
Definition
verifying a user's input to an application
Term
locking cabinet
Definition
a secure storage unit that can be used for storing portable devices
Term
log
Definition
a record of events that occur
Term
mantrap
Definition
a device that monitors and controls two interlocking doors to a small room (a vestibule) designed to separate secure and non secure areas
Term
patch
Definition
a general software security update intended to cover vulnerabilities that have been discovered
Term
pop-up blocker
Definition
either a program or a feature incorporated within a browser that stops pop-up advertisements from appearing
Term
proximity reader
Definition
a device that detects an emitted signal in order to identify the owner
Term
remote wipe/sanitation
Definition
a technology that can securely erase data from a portable device and reset it to its default factory settings
Term
safe
Definition
a ruggedized steel box with a lock
Term
security logs
Definition
logs that are considered the primary source of log data
Term
security policy
Definition
a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure
Term
service pack
Definition
software that is a cumulative package of all security updates plus additional features
Term
signature file
Definition
a sequence of bytes (a string) found in the virus as a virus signature
Term
voice encryption
Definition
using encryption to mask the content of voice communications
Term
3 most important elements to secure data
Definition
host
applications
data
Term
Securing devices includes
Definition
physical access security
host hardware security
mobile device security
Term
Physical security
Definition
restricting access to the areas in which equipment is located
Term
Physical security hardware
Definition
hardware locks
proximity readers
access lists
mantraps
video surveillance
fencing
Term
Cipher Locks
Definition
combination locks that use buttons which must be pushed in the proper sequence to open the door
Term
Hardware security
Definition
physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can be easily stolen
Term
5 steps in protecting the OS
Definition
Develop the security policy
perform host software baselining
configure operating system security and settings
deploy the settings
implement patch management
Term
develop the security policy
Definition
security starts with an organization determining what actions must be taken to create and maintain a secure environment
Term
perform host software baselining
Definition
standard or checklist against which systems can be evaluated and audited for their security posture

outlines major security considerations for a system and becomes the starting point for solid security

used for each computer
Term
Security determines
Definition
what must be protected
Term
baselines are the OS settings that
Definition
impose how the policy will be enforced
Term
Configuring OS security and settings
Definition
Changing any default settings that are insecure

eliminating any unnecessary software, services, or protocols
enabling OS system security features
Term
Security template
Definition
collection of security configuration settings
Term
Security Template deployment
Definition
manually
snapin
group policy
Term
Security template manually
Definition
requires the administrator to access each computer and apply the security template either through using the command line or through snap-in
Term
Snap-in
Definition
software module that provides administrative capabilities for a device
Term
Group policy
Definition
Microsoft windows feature that provides centralized management and configuration of computers and remote users who are using specific Microsoft Directory services known as active directory

this allows a single configuration to be set and then deployed to many or all users
Term
Automatic patch update service
Definition
used to manage patches locally instead of relying upon the vendors online update service
Term
Anti-malware software
Definition
anti-virus
anti-spam
pop-up blockers
anti-spyware
host based firewalls
Term
Virus detection options
Definition
cleaning the file
quarantining
deleting
Term
string scanning
Definition
matching approach of signature files sent to a database with a sequence of bytes
Term
Wildcard scanning
Definition
a wild card is allowed to skip bytes or ranges of bytes instead of looking for an exact match
Term
Mismatch scanning
Definition
mismatches allow a set number of bytes in the string to be of any value regardless of their position in the string
Term
blacklist
Definition
list of senders from which no email is to be received
Term
Whitelist
Definition
create a list from which only email can be received
Term
level 1 attachments
outlook blocks 80 different file types
Definition
.exe
.bat
.vbs
.com
Term
Yellow message
Definition
risky location with restrictive privileges
Term
red message
Definition
warning message
file has been scanned with a validation check and something has been detected in file format
Term
firewall
Definition
packet filter
hardware or software that is designed to prevent malicious packets from entering or leaving computers

hardware or software based
Term
Windows 7 firewall configurations
Definition
networks
public networks
home network
Term
Computer security log management
Definition
process for generating, transmitting, storing, analyzing, and disposing of computer security log data
Term
Primary use of logs
Definition
operations
general audits
demonstrating compliance with regulations
Term
2 Types of security related operating system logs
Definition
log based on system events
log based on audit records
Term
System events that are commonly recorded are
Definition
client requests and server responses
usage information
Term
Audit records that are commonly recorded are
Definition
account information
operational information
Term
Security application logs
Definition
AV
Automated patch update service log
Term
Application security includes
Definition
application development
application hardening and patch management
Term
True
Definition
Input validation is not considered the best defense against injection attacks
Term
Application hardening and patch management
Definition
intended to prevent exploiting vulnerabilities in software applications
Term
Content Inspection
Definition
security analysis of the transaction within its approved context

Looks not only at security level but also who is requesting it, where it is stored , and when it was requested, and where it is going.
Term
DLP uses ___
Definition
fingerprinting to more closely identify important data
Supporting users have an ad free experience!