Security Operations (OPS) Flashcards
Acoustical Detection
Microphones, vibrations sensors
Admissible Evidence
Relevant, sufficient, reliable, does not have to be tangible
Alarm filtering
The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Alert/Alarm
A signal suggesting a system has been or is being attacked.
Analysis
Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Automatic Recovery
When resolving a single failure (though system administrators are needed to resolve additional failures
Automatic Recovery Without Undo Loss
Higher level of recovery defining prevention against the undue loss of protected objects
Auxiliary Station Systems
Alarm to local fire or police
Backup Storage Media
Tape: sequential, slow read, fast write 200GB an hour, historically
cheaper than disk (now changing), robotic libraries
Disk: fast read/write, less robust than tape
Optical drive: CD/DVD. Inexpensive
Solid state: USB drive, security issues, protected by AES
Best Evidence
Primary: used at the trial because it is the most reliable.
Original documents are used to document things such as contracts
Bind Variables
Placeholders for literal values in SQL query being sent to the database on a server; Used to enhance performance of a database
Business Attacks
Focus on illegally obtaining an organization’s confidential information. The use of the information gathered usually causes more damage than the initial event itself.
Central Stations
Less than 10mins travel time for e.g. an private security firm
Chain of Custody
Collection, analysis and preservation of data
Forensics uses bit-level copy of the disk
Change Control
Maintaining full control over requests, implementation, traceability, and proper documentation of changes.
Cipher Lock
Electrical
Circumstantial Evidence
Used to help assume another fact
Cannot stand on its own to directly prove a fact
Civil Law
Europe, South America
Classification
The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Classification Scheme
organization way of classifying data by factors such as criticality, sensitivity and ownership.
Clearing
Overwriting media to be reused
Combination Lock
3 digits with wheels
Common Law
USA, UK Australia Canada (judges)
Computer Crime Laws
3 types of harm:
unauthorized intrusion
unauthorized alteration or destruction
malicious code