Lesson 2 Flashcards
(8 cards)
Is the act of verifying a claim of identity and is one of the primary techniques of separation used in computer security.
Authentication
a duplicate copy of all the important computer files that are kept in another separate location
Data Backups
shield access to internal network services, and block certain kinds of attacks through packet filtering.
Firewalls
serves as a gatekeeper functionality that protects intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the
Internet and other networks.
Firewall
It is a system designed to detect network attacks in-progress and assist in post-attack forensics. It can scan a network for people that are on the network but who should not be there or are doing things that they should not be doing,
Intrusion Detection Systems
It search for virus signatures or use algorithmic detection methods to identify known virus. When a virus is found it removes or quarantines it.
Antivirus Scanner
reflects measures taken throughout the software development Life Cycle ( SDLC) to prevent flaws in computer code or operating system vulnerabilities introducedduring the design, development or deployment of an application.
Program Security
is the practice of developing computer software in
a way that guards against the introduction of security vulnerabilities.
Security Coding