Terms Flashcards

(20 cards)

1
Q

Bidirectional Network

A

A bidirectional network is a network appliance or device allowing data to travel in two, usually opposite, directions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enterprise Password Vault

A

A repository where multiple user passwords are protected behind one master password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Personal Identifiable Information (PII)

A

First name or first initial AND last name in combination of one of the following: SS#, DL, or State ID Card #, account #, credit or debit card # in combination with security code, access code or password that would permit access to a person’s financial account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Personal Health Information (PHI)

A

Individually identifiable information (including demographics) that relates to health condition, the provision of healthcare, or payment for such care.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Individual Identifiable Information (III)

A

Information unique to an individual, which could connect an individual to a unique set of information. Can be in any medium (hard copy, oral, electronic).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protected Information

A

Subject to state, federal or other laws which typically place legal restrictions on what can or cannot be done with the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidential Information

A

Non-public information owned by a business or an entity where the business owes confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Public Information

A

Information in the public domain and available for anyone with an interest to see.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

De-Militarized Zone (DMZ)

A

A collection of hardware and services made available to outside, I trusted sources through a multi-layered tiered system.

Presentation Zone –> Web Application Zone –> Database Zone (only excepts traffic from web application zone servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Golden Rule

A

The rules that are currently in the firewall and are permanent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ask

A

Application Service Knowledgebase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transmission Control Protocol (TCP)

A

A core protocol of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore the entire suite is commonly referred to as TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Policy Intake Form (SPIF)

A

Form to add a (permanent) standard to the rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PEX

A

Policy Exception - one time exception to the policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

REM

A

Remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RSK

A

Risk Decision (Risk Register) - permanent policy exception

17
Q

Unidirectional Network

A

A unidirectional network (also referred to as a unidirectional security gateway or data diode) is a network appliance or device allowing data to travel only in one direction, used in guaranteeing information security. They are most commonly found in high security environments such as defense, where they serve as connections between two or more networks of differing security classifications.

18
Q

Pen Test

A

A penetration test simulates the actions of an internal or external attacker attempting to breach the security of the organization. Pen testing uses tools and techniques similar to those used by hackers to answer the question “Can someone break into the app or network and what can they get to if they succeed?”

19
Q

Static Code Analysis

A

Analysis of native, uncompiled source code. This activity is performed b the application team, as part of the software development lifecycle (SDLC).

20
Q

Dynamic Web Scanning

A

Web application vulnerability scans designed to connect to live Web applications, crawl/spider through the application, and test for known security vulnerabilities.