Term
Intrusion Prevention System |
|
Definition
Provides real-time detection of certain types of attacks while they are in progress. |
|
|
Term
Intrusion Prevention System |
|
Definition
Able to detect malicious activity and automatically block the attack in real-time. |
|
|
Term
|
Definition
Prevents undesirable traffic form entering prescribed areas within a network |
|
|
Term
|
Definition
Hiding communications from anyone other than the intended user |
|
|
Term
|
Definition
Attacks in which one device poses as another by falsifying data |
|
|
Term
|
Definition
Attacks that make computer resources unavailable to intended users. |
|
|
Term
|
Definition
Prevent the unauthorized disclosure of sensitive information. |
|
|
Term
|
Definition
Protect Information or processes from unauthorized or accidental modification |
|
|
Term
|
Definition
Information is accessible by authorized users when needed |
|
|
Term
3 Well Known Security Organizations |
|
Definition
1. SysAdmin, Audit, Network, Security Institute 2. Computer Emergency Response Team 3. INternational Information Systems Security Certification Consortium |
|
|
Term
|
Definition
Determine the quantitative and qualitative value of risk |
|
|
Term
|
Definition
Document that describes the restriction on member behaviors and what information may be accessed by whom |
|
|
Term
Organization of Information Security |
|
Definition
The governance model for information security |
|
|
Term
|
Definition
inventory and classification scheme for information assets |
|
|
Term
|
Definition
Security related to people joining, moving and leaving an organization |
|
|
Term
Physical and Environment Security |
|
Definition
Protection of the computer facilities in an organization |
|
|
Term
Communications and Operations Management |
|
Definition
Managing the security controls in systems and networks |
|
|
Term
|
Definition
Restriction of access rights to the organization's assets. |
|
|
Term
Information Systems Acquisition, Development and Maintenance |
|
Definition
Integrating security into applications |
|
|
Term
Information Security Incident Management |
|
Definition
How to anticipate and respond to information security breaches |
|
|
Term
Business continuity Management |
|
Definition
Protection, maintenance and recover of business-critical processes and systems. |
|
|
Term
|
Definition
Ensuring conformance with information security policies, standards, and regulations |
|
|
Term
|
Definition
Software which attaches to another program to execute a specific unwanted function on a computer |
|
|
Term
|
Definition
Executes code and installs copies of itself in the memory of the infected computer, which then infects other hosts |
|
|
Term
|
Definition
An application written to look like something else. When it is opened, it attacks teh end-user computer from within |
|
|
Term
|
Definition
A vulnerability on a system that the worm exploits |
|
|
Term
|
Definition
The method by which the code replicates itself and locates new targets |
|
|
Term
|
Definition
Any malicious code that results in some action |
|
|