Shared Flashcard Set

Details

Security + Chapter 15
Security + Chapter 15
26
Computer Science
Not Applicable
08/02/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Fire Suppression
Definition
The process of controlling and/or extinguishing fires to protect
people and an organization’s data and equipment.
Term
Wet Pipe Sprinkler System
Definition
Consists of a pressurized water supply system that can
deliver a high quantity of water to an entire building via a piping distribution system.
Term
Pre-Action Sprinkler System
Definition
Similar to a dry pipe system, but there are requirements
for it to be set off such as heat or smoke.
Term
Special Hazard Protection System
Definition
A clean agent sprinkler system such as FM-200
used in server rooms.
Term
Hot and Cold Aisles
Definition
The aisles in a server room or data center that circulate cold air
into the systems and hot air out of them. Usually, the systems and cabinets are supported
by a raised floor.
Term
Pretexting
Definition
When a person invents a scenario, or pretext, in the hope of persuading
a victim to divulge information.
Term
Diversion Theft
Definition
When a thief attempts to take responsibility for a shipment by diverting
the delivery to a nearby location.
Term
Phishing
Definition
The criminally fraudulent process of attempting to acquire sensitive information
such as usernames, passwords, and credit card details by masquerading as
a trustworthy entity in an electronic communication.
Term
Vishing
Definition
A type of phishing attack that makes use of telephones and VoIP.
Term
Spear Phishing
Definition
A type of phishing attack that targets particular individuals.
Term
Whaling
Definition
A phishing attack that targets senior executives.
Term
Hoax
Definition
The attempt at deceiving people into believing something that is false.
Term
Shoulder Surfing
Definition
When a person uses direct observation to find out a target’s password,
PIN, or other such authentication information.
Term
Eavesdropping
Definition
When a person uses direct observation to “listen” in to a conversation.
Term
Dumpster Diving
Definition
When a person literally scavenges for private information in garbage
and recycling containers.
Term
Baiting
Definition
When a malicious individual leaves malware-infected removable media,
such as a USB drive or optical disc, lying around in plain view.
Term
Piggybacking
Definition
When an unauthorized person tags along with an authorized person
to gain entry to a restricted area.
Term
Tailgating
Definition
A type of piggybacking where an unauthorized person follows an authorized
person into a secure area, without the authorized person’s consent.
Term
Mantrap
Definition
An area between two doorways, meant to hold people until they are identified
and authenticated.
Term
Acceptable Use
Definition
Acceptable usage policies define the rules that restrict how a
computer, network, or other system may be used.
Term
PII
Definition

Personally Identifiable Information

 

Information used to uniquely identify, contact, or locate a person.

Term
SLA
Definition

Service Level Agreement

 

Part of a service contract where the level of service is formally defined.

Term
First Responders
Definition
People who perform preliminary analysis of the incident data and
determine whether the incident is an incident or just an event, and the criticality of
the incident.
Term
Chain of Custody
Definition
Documents who had custody of evidence all the way up to litigation
or a court trial (if necessary) and verifies that the evidence has not been modified.
Term
Incident Response
Definition
A set of procedures that an investigator goes by when examining
a computer security incident.
Term
Incident Management
Definition
The monitoring and detection of security events on a computer
network and the execution of proper responses to those security events.
Supporting users have an ad free experience!