700 Flashcards
(100 cards)
A notification that an unusual condition exists and should be investigated.
alert
The series of steps/formula/process that is followed to arrive at a result.
algorithm
The component or process that analyzes the data collected by the sensor.
analyzer
A calculation that is used to identify risks and calculate the expected loss each year.
annual loss expectancy (ALE)
A calculation of how often a threat will occur.
annualized rate of occurrence (ARO)
The act of looking for variations from normal operations (anomalies) and reacting to them.
anomaly detection
Authentication that doesn’t require a user to provide a username - password - or any other identification before accessing resources.
anonymous authentication
A category of software that uses various methods to prevent and eliminate viruses in a computer.
antivirus
The core program that runs the virus-scanning process.
antivirus engine
Software that identifies the presence of a virus and is capable of removing or quarantining the virus.
antivirus software
A networking capability included with all Macintosh Computers.
AppleTalk
A freestanding device that operates in a largely self-contained manner.
appliance
The seventh layer of the OSI model. This layer deals with how applications access the network and describes application functionality - such as file transfer - messaging - and so on.
Application layer
An abstract interface to the services and protocols provided by an operating system.
Application Programming Interface (API)
A virus that is protected in a way that makes disassembling it difficult.
armored virus
Any resource of value.
asset
Any unauthorized intrusion into the normal operations of a computer or computer network.
attack
Files that hold information about a resource’s access by users.
audit files
The act of tracking resource usage by users.
auditing
Individuals involved in auditing log and security files.
auditors
Verifying that the logs and other resources collected are legitimate.
authenticating the evidence
The means of verifying that someone is who they say they are.
authentication
The time period during which a resource can be accessed.
availability
An opening left in a program application (usually by the developer) that allows additional access to data.
backdoor