Glossary Flashcards
(500 cards)
heat map risk matrix
A graphical table indicating the likelihood and impact of risk factors identified for a workflow, project, or department for reference by stakeholders.
lessons learned report (LLR)
An analysis of events that can provide insight into how to improve response and support processes in the future.
network log
A target for system and access events generated by a network appliance, such as a switch, wireless access point, or router.
File Transfer Protocol (FTP)
Application protocol used to transfer files between network hosts. Variants include S(ecure)FTP, FTP with SSL (FTPS and FTPES), and T(rivial)FTP. FTP utilizes ports 20 and 21.
quantitative risk analysis
A numerical method that is used to assess the probability and impact of risk and measure the impact.
provenance
In digital forensics, being able to trace the source of evidence to a crime scene and show that it has not been tampered with.
Internet header
A record of the email servers involved in transferring an email message from a sender to a recpient.
clean desk policy
An organizational policy that mandates employee work areas be free from potentially sensitive information; sensitive documents must not be left out where unauthorized personnel might see them.
capacity planning
A practice which involves estimating the personnel, storage, computer hardware, software, and connection infrastructure resources required over some future period of time.
port mirroring (SPAN)
Copying ingress and/or egress communications from one or more switch ports to another port. This is used to monitor communications passing over the switch.
Internet Protocol Security (IPSec)
Network protocol suite used to secure data through authentication and encryption as the data travels across the network or the Internet.
geographic dispersion
A resiliency mechanism where processing and data storage resources are replicated between physically distant sites.
mean time to repair/replace/recover (MTTR)
A metric representing average time taken for a device or component to be repaired, replaced, or otherwise recover from a failure.
logic bomb
A malicious program or script that is set to run under particular circumstances or in response to a defined event.
password best practices
Rules to govern secure selection and maintenance of knowledge factor authentication secrets, such as length, complexity, age, and reuse.
environmental attack
A physical threat directed against power, cooling, or fire suppression systems.
representational state transfer (REST)
A standardized, stateless architectural style used by web applications for communication and integration.
listener/collector
A network appliance that gathers or receives log and/or state data from other network systems.
pretexting
Social engineering tactic where a team will communicate, whether directly or indirectly, a lie or half-truth in order to get someone to believe a falsehood.
Remote Authentication Dial-in User Service (RADIUS)
AAA protocol used to manage remote and wireless authentication infrastructures.
network functions virtualization (NFV)
Provisioning virtual network appliances, such as switches, routers, and firewalls, via VMs and containers.
behavior-based detection
A network monitoring system that detects changes in normal operating data sequences and identifies abnormal sequences.
onboarding
The process of bringing in a new employee, contractor, or supplier.
information security policies
A document or series of documents that are backed by senior management and that detail requirements for protecting technology and information assets from threats and misuse.