Domain 7 Flashcards

1
Q

Allowed Listing

A

These systems also alert designated IT security personnel if the attempt involves a resource not on a pre-approved list. Standalone security tools and integrated systems which provide these capabilities are now starting to incorporate anti-malware processes as part of their offerings; similarly, In this course, “blocked list” and “allowed list” replace “blacklist” and “whitelist.” Anti-malware products have begun to incorporate these blocked listing /allowed listing management and use capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Alternate Site

A

A general term for a contingency or continuity of operations (COOP) site used to assume system or organizational operations in the event that the primary site is not usable for a period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backup

A

A copy of files and programs made to facilitate recovery, if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baseline

A

The total inventory of all of a system’s components, including hardware, software, data, administrative controls, documentation or user instructions. Types of baselines include: Enumerated baselines, which are inventory lists generated by systems cataloging, discovery and enumeration Build Security baselines associate the minimum acceptable set of security controls for each CI within a configuration baseline. Modification, update or patch baselines, which are subsets of a total system baseline. These would contain only those CIs which have been modified. or deployment baselines, which are configuration baselines for instances of a system being built for a specific purpose (such as security assessment) or environment (such as production or delivery to end users). tools. Configuration baselines, which have a revision or version identifier associated with each configuration item (CI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baselining

A

Creating a total inventory of a system, component by component, part by part.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Blocked Listing and Allowed Listing

A

Use of lists of blocked or allowed identities, whether as users, URLs, URIs, web addresses, IP addresses, geographic regions, hardware addresses, files or programs, as a means of controlling (prohibiting or permitting) their access, use or attempt to load and execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Change Management

A

The formal process an organization uses to transition from the current state to a future state. This typically includes mechanisms to request, evaluate, approve, implement, verify and learn from the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Configuration Item

A

An aggregation of information system components that is designated for configuration management and treated as a single entity in the configuration management process. Item or aggregation of hardware, software, or both, which is designated for configuration management and treated as a single entity in the configuration management process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Configuration Management (CM)

A

A collection of activities focused on establishing and maintaining the integrity of information technology products and information systems, through control of processes for initializing, changing and monitoring the configurations of those products and systems throughout the system development lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cyber Forensics

A

The practice of gathering, retaining and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disaster Recovery

A

The ability to provide IT services following an interruption, often at an alternate location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disruption

A

An unplanned event that causes an information system to be inoperable for a length of time (e.g., minor or extended power outage, extended unavailable network or equipment or facility damage or destruction).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Egress Monitoring

A

Monitoring the flow of information out of an organization’s control boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Entity

A

Any form of user, such as a hardware device, software daemon, task, processing thread or human, which is attempting to use or access systems resources. Endpoint devices, for example, are entities that human (or nonhuman) users make use of in accessing a system. Should be subject to access control and accounting. See also User and Entity Behavior Analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Eradication

A

In incident response, the activities which remove the cause of the incident from the environment. This often requires the use of a formal root cause analysis process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Event

A

Any observable occurrence in a network or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

False Positive

A

Incorrectly classifying a benign activity, system state or configuration as malicious or vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Forensics, Cyber Forensics

A

The examination of evidence related to suspected criminal activity. Cyber forensics refers to investigations of such activities involving information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Full Backup

A

Copies the entire system to backup media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hackback

A

Actions taken by a victim of hacking to compromise the systems of the alleged attacker.

21
Q

Hardening

A

A reference to the process of applying secure configurations (to reduce the attack surface) and locking down various hardware, communications systems and software, including operating system, web server, application server, application. Hardening is normally performed based on industry guidelines and benchmarks such as those provided by the Center for Internet Security (CIS).

22
Q

Heuristics

A

A method of machine learning, which identifies patterns of acceptable activity so that deviations from the patterns will be identified.

23
Q

Honeypots/ Honeynets

A

Machines that exist on the network, but do not contain sensitive or valuable data; they are meant to distract and occupy malicious attackers or unauthorized intruders, as a means of delaying their attempts to access production data/assets. A number of machines of this kind, linked together a network or subnet, are referred to as a honeynet.

24
Q

Hot Site

A

A fully operational offsite data processing facility equipped with hardware and software, to be used in the event of an information system disruption.

25
Q

Incident

A

An event which actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits.

26
Q

Incident Response

A

The mitigation of violations of security policies and recommended practices.

27
Q

Indicator

A

A technical artifact or observable occurrence that suggests an attack is imminent or is currently underway, or that a compromise may have already occurred.

28
Q

Indicators of Compromise (IoC)

A

A signal that an intrusion, malware or other predefined hostile or hazardous set of events is occurring or has occurred.

29
Q

Information Security Continuous Monitoring (ISCM)

A

Maintaining ongoing awareness of information security, vulnerabilities and threats to support organizational risk management decisions. [Note: The terms “continuous” and “ongoing” in this context mean that security controls and organizational risks are assessed and analyzed at a frequency to systems, networks and cyberspace, by assessing security control implementation and organizational security status in accordance with organizational risk tolerance, and within a reporting structure designed to make real-time, data-driven risk management decisions. sufficient to support risk-based security decisions to adequately protect organization information.] Ongoing monitoring sufficient to ensure and assure effectiveness of security controls related

30
Q

Information Sharing and Analysis Center (ISAC)

A

Any entity or collaboration created or employed by public- or private-sector organizations, for purposes of gathering and analyzing critical cyber and related information in order to better understand security problems and interdependencies related to cyber systems, to ensure their availability, integrity and reliability.

31
Q

Intrusion

A

A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system or system resource without having authorization to do so.

32
Q

Intrusion Detection System (IDS)

A

A security service that monitors and analyzes network or system events for the purpose of finding and providing real time or near real-time warning of, attempts to access system resources in an unauthorized manner.

33
Q

Intrusion Prevention Systems (IPS)

A

A security service that uses available information to determine if an attack is underway; it then sends alerts, but also blocks the attack from reaching its intended target.

34
Q

Log

A

A record of actions and events that have taken place on a computer system.

35
Q

Patch

A

A software component that, when installed, directly modifies files or device settings related to a different software component without changing the version number or release details for the related software component.

36
Q

Patch Management

A

The systematic notification, identification, deployment, installation and verification of operating system and application software code revisions. These revisions are known as patches, hot fixes and service packs.

37
Q

Precursor(s)

A

Signals from events that suggest a possible change of conditions (internal or external to the organization) may alter the current threat landscape. An increase in tensions in the local political or social environment, or complaints or grievances by employees or customers going viral in social media, are examples of precursors.

38
Q

Provisioning

A

Taking a particular configuration baseline, making additional or modified copies of it, then taking steps as necessary to properly place those copies into the environments they should belong in.

39
Q

Ransom Attack

A

Any form of attack, which threatens the destruction, denial or unauthorized public release or remarketing of private information assets. Usually involves encrypting these assets and withholding the decryption key until the ransom is paid by the victim.

40
Q

Ransomware

A

Malware used for the purpose of facilitating a ransom attack.

41
Q

Recovery

A

The process of jointly addressing business resiliency and restoration of critical infrastructure and functionality after a disruption.

42
Q

Regression Testing

A

Testing of a system to ascertain whether recently approved modifications have changed its performance of other approved functions or has introduced other unauthorized behaviors.

43
Q

Remediation

A

Changes to a system’s configuration to immediately limit or reduce the chance of reoccurrence of an incident. This might include updating the sensitivities, thresholds or alarm settings on any number of security controls, or instituting a rapid reset of access controls information such as passwords and security challenge responses.

44
Q

Request for Change (RFC)

A

The documentation of a proposed change in support of change management activities.

45
Q

Root Cause Analysis

A

A principle-based, systems approach for the identification of underlying causes associated with a particular set of risks or incidents.

46
Q

Sandbox

A

A testing environment that is logically, physically or virtually isolated from other environments, and in which applications or systems can be evaluated. Sandboxes can be used as part of development, integration or acceptance testing (so as to not interact with the production environments), as part of malware screening, or as part of a honeynet.

47
Q

Threat Intelligence

A

Threat information that has been aggregated, transformed, analyzed, interpreted or enriched to provide the necessary context for decision-making processes.

48
Q

User and Entity Behavior Analytics (UEBA)

A

Analysis of behaviors and activities of human and nonhuman users, and of the software and hardware entities associated with those users and activities, as a way of detecting inappropriate or unauthorized activity, including fraud detection, malware and insider attacks.

49
Q

Vulnerability Management

A

The activities necessary to identify, assess, prioritize and remediate information system weaknesses.