Term
Prevents Undesirable traffic from entering prescribed areas within a network |
|
Definition
|
|
Term
Provides real-time detection of certain types of attacks while they are in progress |
|
Definition
|
|
Term
Protect information or processes from unauthorized or accidental modification |
|
Definition
|
|
Term
Able to detect malicious activity and automatically block the attack in real-time |
|
Definition
|
|
Term
Prevent the unauthorized disclosure of sensitive information |
|
Definition
|
|
Term
Attack in which one device poses as another by falsifying data |
|
Definition
|
|
Term
Hiding communications from anyone other than the intended user |
|
Definition
|
|
Term
Attacks that make computer resources unavailable to intended users |
|
Definition
|
|
Term
Information is accessible by authorized users when needed |
|
Definition
|
|
Term
Document that describes the restrictions on member behaviors and what info may be accessed by whom |
|
Definition
|
|
Term
Security related to people joining moving and leaving an org |
|
Definition
|
|
Term
Inventory and classification scheme for information assets |
|
Definition
|
|
Term
Restriction of access rights to the organizations assets |
|
Definition
|
|
Term
Protection of the computer facilities in an org |
|
Definition
Physical and Environmental Security |
|
|
Term
Managing the security controls in systems and networks |
|
Definition
Communications and Operations Mgmt |
|
|
Term
The governance model for information security |
|
Definition
Organization of Information Security |
|
|
Term
How to anticipate and respond to information security breaches |
|
Definition
Information Security Incident Mgmt |
|
|
Term
Ensuring conformance with information security policies standards and regulations |
|
Definition
|
|
Term
Integrating security into applications |
|
Definition
Information Systems Acquisition, Development, and Maintenance |
|
|
Term
Determine the quantitative and qualitative value of risk |
|
Definition
|
|
Term
Protection, maintenance and recovery of business-critical processes and systems |
|
Definition
|
|
Term
Software which attaches to another program to execute a specific unwanted function on a computer |
|
Definition
|
|
Term
An application written to look like something else. When it is opened it attacks the end-user computer from within |
|
Definition
|
|
Term
Executes code which installs copies of itself in the memory fo the infected computer, which in turn infects other hosts |
|
Definition
|
|
Term
Any malicious code that results in some action |
|
Definition
|
|
Term
The method by which the code replicates itself and locates new targets |
|
Definition
|
|
Term
A vulnerability on a system that the worm exploits |
|
Definition
|
|
Term
5 phases of attach in proper order (5 P's) |
|
Definition
Probe Penetrate Persist Propagate Paralyze |
|
|
Term
Most attacks take advantage of what type of vulnerability? |
|
Definition
Overflow of a fixed memory allocation size for a particular purpose |
|
|
Term
Antivirus software will prevent viruses from entering the network? T/F |
|
Definition
|
|
Term
Compartmentalization and segmentation of the network to slow down or stop the work and prevent further infections |
|
Definition
|
|
Term
Identifying and isolating infected machines within the contained areas |
|
Definition
|
|
Term
Disinfecting of worm from infected systems |
|
Definition
|
|
Term
All uninfected systems are patched with appropriate vendor patch |
|
Definition
|
|
Term
Exploit known vulnerabilities to gain entry to web accounts, databases, etc.. |
|
Definition
|
|
Term
Unauthorized mapping and discovery of systems, services, or vulnerabilities |
|
Definition
|
|
Term
Send extremely large numbers of requests, slowing or crashing a device |
|
Definition
|
|
Term
Ping Sweep Port Scan Packet Sniffer Internet Information Queries |
|
Definition
|
|
Term
Password Attack Man-in-the-Middle Trust exploitation Port Redirection Buffer Overflow |
|
Definition
|
|
Term
Ping of Death TCP SYN flood Smurf Attack Poisonous Packet Continuous Stream of Packets |
|
Definition
|
|
Term
Use Authentication Use a switched infrastructure Use anti-sniffer tools |
|
Definition
|
|
Term
Minimize trust relationships Use strong passwords Apply OS and application patches |
|
Definition
|
|
Term
Implement QoS and traffic policing Anti-spoofing techniques |
|
Definition
|
|
Term
Name a primary mitigation technique useful in both recon and DoS attacks. |
|
Definition
|
|
Term
Name a primary mitigation techinque useful for both recon and access attacks |
|
Definition
|
|