IS3220 CHAPTER 1 Flashcards
The process or mechanism of granting or denying use of a resource; typically applied to users or generic network traffic is called ___?
ACCESS CONTROL
A hardware product that is dedicated to a single primary function. The operating system or firmware of the hardware device is hardened and its use is limited to directly and only supporting the intended function. Firewalls, routers, and switches are typical ___?
APPLIANCE
Anything you use in a business process to accomplish a business task is considered an ___?
ASSET
This can be the action of a system that is recording user activity and system events into a log. It can also be the action of one who checks for compliance with security policies and other regulations and is called the act of ___?
AUDITING
Either an outside consultant or an internal member of the Information Technology staff. They perform security audits, confirms that the checking is sufficient, and investigates trails produced by system checks. In the case of regulatory compliance, they should be external and independent of the organization. This person/position is called ___?
AUDITOR
The process of confirming the identity of a user. It is also know as logon and is called ___?
AUTHENTICATION
Defining what users are allowed and not allowed to do. This is also known as access control and is called ___?
AUTHORIZATION
When a system is usable for its intended purpose. The security service that supports access to resources in a timely manner. If availability becomes compromised, a denial of service is taking place and is called ___?
AVAILABILITY
This is any access method or pathway that circumvents access or authentication mechanisms or unauthorized access to a system is called ___?
BACKDOOR
A type of filtering in which all activities or entities are permitted except for those on a ___?
BLACK LIST
Any restriction on the performance of a system. Can be caused by a slower component or pathway with insufficient throughput. It causes other components of system to work slower than their optimum rate and is called ___?
BOTTLENECK
Any compromise of security. Any violation of a restriction or rule whether caused by an authorized user or an unauthorized outsider is called ___?
BREACH
A network device that forwards traffic between networks based on the MAC address of the Ethernet frame. It forwards only packets whose destination address is on the opposing network and is called ___?
BRIDGE
Any activity necessary to meet an organization’s long-term goals. These are assigned to employees and other authorized personnel via their job description and is called ___?
BUSINESS TASK
Specifically, this is a proxy server and is the retention of Internet content. Various internal clients may access this content and provide it to subsequent requesters without the need to retrieve the same content from the Internet repeatedly and is called ___?
CACHING
Similar to a bottleneck, but deliberately created within a network infrastructure. It is a controlled pathway through which all traffic must cross. At this point, filtering to block unwanted communication or monitoring can occur and is called ___?
CHOKE POINT
This is a host on a network. It is the computer system, which supports user interaction with the network. Users employ this to access resources from the network. Users can also employ this generically as any hardware or software product to access a resource. This is called a ___?
CLIENT
A form of network where certain computers are designated as “servers” to host resources shared with the network. The remaining computers are designated as this to enable users to access shared resources. Most ___ employ directory services and single sign-on.
CLIENT/SERVER NETWORK
The security service of preventing access to resources by unauthorized users, while supporting access to authorized users is called ___?
CONFIDENTIALITY
A tactic of protection involving multiple layers or levels of security components. Based on the idea that multiple protections create a cumulative effect that will require an attacker to breach all layers, not just one is called ___?
DEFENSE IN DEPTH
A type of perimeter network used to host resources designated as accessible by the public from the Internet is called ___?
DEMILITARIZED ZONE (DMZ)
A form of attack that attempts to compromise availability. These attacks are usually of two types: flaw exploitation and flooding and is called ___?
DENIAL OF SERVICE (DoS)
A network service that maintains a searchable index or database of network hosts and shared resources. Often based on a domain name system and an essential service of large networks is called ___?
DIRECTORY SERVICES
A client/server network managed by a directory service is called ___?
DOMAIN