Term
|
Definition
| A record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area |
|
|
Term
|
Definition
| A log that can provide details regarding requests for specific files on a system |
|
|
Term
|
Definition
| software that helps prevent computers from becoming infected by different types of spyware |
|
|
Term
|
Definition
| Software that can examine a computer for any infections as well as monitor computer activity and scan documents that might contain a virus |
|
|
Term
|
Definition
| a log that can track user authentication attempts |
|
|
Term
|
Definition
| logs that are the second common type of security related operating system logs |
|
|
Term
|
Definition
| Spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if it is spam |
|
|
Term
|
Definition
| a device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen |
|
|
Term
CCTV Closed Circuit Television |
|
Definition
| Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring |
|
|
Term
XSRF Cross-site request forgery |
|
Definition
| An attack that uses the user's web browser settings to impersonate the user |
|
|
Term
|
Definition
| A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users |
|
|
Term
|
Definition
| a door lock that extends a solid metal bar into the door frame for extra security |
|
|
Term
|
Definition
| faults in a program that occur while the application is running |
|
|
Term
|
Definition
| logs that can document any unsuccessful events and the most significant successful events |
|
|
Term
|
Definition
| securing a restricted area by erecting a barrier |
|
|
Term
|
Definition
| hardware or software that is designed to prevent malicious packets from entering or leaving computers |
|
|
Term
|
Definition
| a software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program |
|
|
Term
|
Definition
| using the global positioning system to detect the location of a portable device |
|
|
Term
|
Definition
| creating a virtualized environment to simulate the central processing unit and memory to check for the presence of a virus |
|
|
Term
| host-based software firewall |
|
Definition
| a firewall that runs as a program on a local system to protect it against attacks |
|
|
Term
|
Definition
| software that addresses a specific customer situation and often may not be distributed outside that customers organization |
|
|
Term
|
Definition
| verifying a user's input to an application |
|
|
Term
|
Definition
| a secure storage unit that can be used for storing portable devices |
|
|
Term
|
Definition
| a record of events that occur |
|
|
Term
|
Definition
| a device that monitors and controls two interlocking doors to a small room (a vestibule) designed to separate secure and non secure areas |
|
|
Term
|
Definition
| a general software security update intended to cover vulnerabilities that have been discovered |
|
|
Term
|
Definition
| either a program or a feature incorporated within a browser that stops pop-up advertisements from appearing |
|
|
Term
|
Definition
| a device that detects an emitted signal in order to identify the owner |
|
|
Term
|
Definition
| a technology that can securely erase data from a portable device and reset it to its default factory settings |
|
|
Term
|
Definition
| a ruggedized steel box with a lock |
|
|
Term
|
Definition
| logs that are considered the primary source of log data |
|
|
Term
|
Definition
| a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure |
|
|
Term
|
Definition
| software that is a cumulative package of all security updates plus additional features |
|
|
Term
|
Definition
| a sequence of bytes (a string) found in the virus as a virus signature |
|
|
Term
|
Definition
| using encryption to mask the content of voice communications |
|
|
Term
| 3 most important elements to secure data |
|
Definition
|
|
Term
| Securing devices includes |
|
Definition
physical access security host hardware security mobile device security |
|
|
Term
|
Definition
| restricting access to the areas in which equipment is located |
|
|
Term
| Physical security hardware |
|
Definition
hardware locks proximity readers access lists mantraps video surveillance fencing |
|
|
Term
|
Definition
| combination locks that use buttons which must be pushed in the proper sequence to open the door |
|
|
Term
|
Definition
| physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can be easily stolen |
|
|
Term
| 5 steps in protecting the OS |
|
Definition
Develop the security policy perform host software baselining configure operating system security and settings deploy the settings implement patch management |
|
|
Term
| develop the security policy |
|
Definition
| security starts with an organization determining what actions must be taken to create and maintain a secure environment |
|
|
Term
| perform host software baselining |
|
Definition
standard or checklist against which systems can be evaluated and audited for their security posture
outlines major security considerations for a system and becomes the starting point for solid security
used for each computer |
|
|
Term
|
Definition
|
|
Term
| baselines are the OS settings that |
|
Definition
| impose how the policy will be enforced |
|
|
Term
| Configuring OS security and settings |
|
Definition
Changing any default settings that are insecure
eliminating any unnecessary software, services, or protocols enabling OS system security features |
|
|
Term
|
Definition
| collection of security configuration settings |
|
|
Term
| Security Template deployment |
|
Definition
manually snapin group policy |
|
|
Term
| Security template manually |
|
Definition
| requires the administrator to access each computer and apply the security template either through using the command line or through snap-in |
|
|
Term
|
Definition
| software module that provides administrative capabilities for a device |
|
|
Term
|
Definition
Microsoft windows feature that provides centralized management and configuration of computers and remote users who are using specific Microsoft Directory services known as active directory
this allows a single configuration to be set and then deployed to many or all users |
|
|
Term
| Automatic patch update service |
|
Definition
| used to manage patches locally instead of relying upon the vendors online update service |
|
|
Term
|
Definition
anti-virus anti-spam pop-up blockers anti-spyware host based firewalls |
|
|
Term
|
Definition
cleaning the file quarantining deleting |
|
|
Term
|
Definition
| matching approach of signature files sent to a database with a sequence of bytes |
|
|
Term
|
Definition
| a wild card is allowed to skip bytes or ranges of bytes instead of looking for an exact match |
|
|
Term
|
Definition
| mismatches allow a set number of bytes in the string to be of any value regardless of their position in the string |
|
|
Term
|
Definition
| list of senders from which no email is to be received |
|
|
Term
|
Definition
| create a list from which only email can be received |
|
|
Term
level 1 attachments outlook blocks 80 different file types |
|
Definition
|
|
Term
|
Definition
| risky location with restrictive privileges |
|
|
Term
|
Definition
warning message file has been scanned with a validation check and something has been detected in file format |
|
|
Term
|
Definition
packet filter hardware or software that is designed to prevent malicious packets from entering or leaving computers
hardware or software based |
|
|
Term
| Windows 7 firewall configurations |
|
Definition
networks public networks home network |
|
|
Term
| Computer security log management |
|
Definition
| process for generating, transmitting, storing, analyzing, and disposing of computer security log data |
|
|
Term
|
Definition
operations general audits demonstrating compliance with regulations |
|
|
Term
| 2 Types of security related operating system logs |
|
Definition
log based on system events log based on audit records |
|
|
Term
| System events that are commonly recorded are |
|
Definition
client requests and server responses usage information |
|
|
Term
| Audit records that are commonly recorded are |
|
Definition
account information operational information |
|
|
Term
| Security application logs |
|
Definition
AV Automated patch update service log |
|
|
Term
| Application security includes |
|
Definition
application development application hardening and patch management |
|
|
Term
|
Definition
| Input validation is not considered the best defense against injection attacks |
|
|
Term
| Application hardening and patch management |
|
Definition
| intended to prevent exploiting vulnerabilities in software applications |
|
|
Term
|
Definition
security analysis of the transaction within its approved context
Looks not only at security level but also who is requesting it, where it is stored , and when it was requested, and where it is going. |
|
|
Term
|
Definition
| fingerprinting to more closely identify important data |
|
|