IS 414 CH. 8 (VOCAB) Flashcards

1
Q

Defense-in-depth

A

Employing multiple layers of controls to avoid a single point-of-failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Time-based model

A

Implementing a combination of preventative, detective, and corrective controls that protect information assets long enough to enable an organization to recognize that an attack is occurring and take steps to thwart it before any information is lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Engineering

A

using deception to obtain unauthorized access to information resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

Verifying the identity of the person or device attempting to access the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Biometric identifier

A

A physical or behavioral characteristic that is used as an authentication credential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multifactor authentication

A

The use of two or more types of authentication credentials in conjunction to achieve a greater level of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multimodal authentication

A

The use of multiple authentication credentials of the same type to achieve a greater level of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authorization

A

The process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access control matrix

A

A table usd to implement authorization controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compatibility test

A

Matching the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Border router

A

A device that connects an organization’s information system to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewall

A

A special-purpose hardware device or software running a general-purpose computer that controls both inbound and outbound communication between the system behind the firewall and other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Demilitarized zone (DMZ)

A

A separate network located outside the organization’s internal information system that permits controlled access from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Routers

A

Special purpose devices that are designed to read the source and destination address field in IP packet headers to decide where to send (route) the packet next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access control list (ACL)

A

A set of if-then rules used to determine what to do with arriving packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Packet filtering

A

A process that uses various fields in a packet’s IP and TCP headers to decide what to do with the packet

17
Q

Deep packet inspection

A

A process that examines the data in the body of a TCP packets to control traffic, rather than looking only at the information in the IP and TCP headers

18
Q

Intrusion prevention systems (IPS)

A

Software or hardware that monitors patterns in the traffic flow to identify and automatically block attacks

19
Q

Remote authentication dial-in user service (RADIUS)

A

A standard method for verifying the identity of users attempting to connect via dial-in access

20
Q

War dialing

A

Searching for an idle modem by programming a computer to dial thousands of phone lines

21
Q

Endpoints

A

Collective term for the workstations, servers, printers, and other devices that comprise an organization’s network

22
Q

Vulnerabilities

A

Flaws in programs that can be exploited to either crash the system or take control of it

23
Q

Vulnerability scanners

A

Automated tools designed to identify whether a given system possesses any unused and unnecessary programs that represent potential security threats

24
Q

Hardening

A

The process of modifying the default configuration of endpoints to eliminate unnecessary settings and services

25
Q

Change control and change management

A

The formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability

26
Q

Log analysis

A

The process of examining logs to identify evidence of possible attacks

27
Q

Intrusion detection systems (IDS)

A

A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions

28
Q

Penetration test

A

An authorized attempt to break into the organization’s information system

29
Q

Computer incident response team (CIRT)

A

A team that is responsible for dealing with major security incidents

30
Q

Exploit

A

A program designed to take advantage of a known vulnerability

31
Q

Patch

A

Code released by software developers that fixes a particular vulnerability

32
Q

Patch management

A

The process of regularly applying patches and updates to software

33
Q

Virtualization

A

Running multiple systems simultaneously on one physical computer

34
Q

Cloud computing

A

Using a browser to remotely access software, data storage, hardware, and applications