Shared Flashcard Set

Details

SEC110_CH05
Host, Application, and Data Security
35
Computer Networking
Undergraduate 3
09/05/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
access list
Definition
A record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.
Term
access log
Definition
A log that can provide details regarding requests for specific files on a system.
Term
anti-spyware
Definition
Software that helps prevent computers from becoming infected by different types of spyware.
Term
anti-virus (AV)
Definition
Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus.
Term
audit log
Definition
A log that can track user authentication attempts.
Term
audit records
Definition
Logs that are the second common type of security-related operating system logs.
Term
Bayesian filtering
Definition
Spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if it is spam.
Term
cable lock
Definition
A device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen.
Term
closed-circuit television (CCTV)
Definition
Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring.
Term
cross-site request forgery (XSRF)
Definition
An attack that uses the user's Web browser settings to impersonate the user.
Term
data loss prevention (DLP)
Definition
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users.
Term
deadbolt lock
Definition
A door lock that extends a solid metal bar into the door frame for extra security.
Term
errors (exceptions)
Definition
Faults in a program that occur while the application is running.
Term
event logs
Definition
Logs that can document any unsuccessful events and the most significant successful events.
Term
fencing Securing
Definition
a restricted area by erecting a barrier.
Term
firewall (packet filter)
Definition
Hardware or software that is designed to prevent malicious packets from entering or leaving computers.
Term
fuzz testing (fuzzing)
Definition
A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.
Term
GPS tracking
Definition
Using the Global Positioning System (GPS) to detect the location of a portable device.
Term
heuristic detection
Definition
Creating a virtualized environment to simulate the central processing unit (CPU) and memory of the computer to check for the presence of a virus.
Term
host-based software firewall
Definition
A firewall that runs as a program on a local system to protect it against attacks.
Term
hotfix
Definition
Software that addresses a specific customer situation and often may not be distributed outside that customer's organization.
Term
input validation
Definition
Verifying a user's input to an application.
Term
locking cabinet
Definition
A secure storage unit that can be used for storing portable devices.
Term
log
Definition
A record of events that occur.
Term
mantrap
Definition
A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas.
Term
patch
Definition
A general software security update intended to cover vulnerabilities that have been discovered.
Term
pop-up blocker
Definition
Either a program or a feature incorporated within a browser that stops pop-up advertisements from appearing.
Term
proximity reader
Definition
A device that detects an emitted signal in order to identify the owner.
Term
remote wipe/sanitation
Definition
A technology that can remotely erase data from a portable device and reset it to its default factory settings.
Term
safe
Definition
A ruggedized steel box with a lock.
Term
security logs
Definition
Logs that are considered the primary source of log data.
Term
security policy
Definition
A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.
Term
service pack
Definition
Software that is a cumulative package of all security updates plus additional features.
Term
signature file
Definition
A sequence of bytes (a string) found in the virus as a virus signature.
Term
voice encryption
Definition
Using encryption to mask the content of voice communications.
Supporting users have an ad free experience!