Term
File Integrity Check on Windows |
|
Definition
|
|
Term
|
Definition
Blocks traffic based on port, protocol, IP address, or application on a single host only |
|
|
Term
|
Definition
A firewall setting that only allows a specified list of applications to run |
|
|
Term
|
Definition
A firewall configuration that blocks specific applications from running |
|
|
Term
|
Definition
-Prevent users from using USB, CD/DVD. or other portable drives -Prevents Exfiltration -Prevent installation of Malware |
|
|
Term
|
Definition
Unauthorized Removal of data |
|
|
Term
|
Definition
Block execution based on -File Signature -Heuristics -Sandboxing -Virtualizing |
|
|
Term
Unified Threat Management UTM |
|
Definition
Multipurpose suite of tools including: -Firewall -NIDS/NIPS -Gateway AV / AntiSpam -VPN Functionality -Content filtering -Load Balancing -DLP |
|
|
Term
|
Definition
-Tools that can reside locally on a host , centrally, or cloud based -Scans for sensitive information leakage -PII or PCI data -Can integrate with email, IM, and other communications tools |
|
|
Term
Data Execution Prevention DEP |
|
Definition
-Marks pages of memory as non-executable -Prevents buffer overruns -First introduced with Win XP and Server 2003 |
|
|
Term
Web Application Firewall WAF |
|
Definition
-Hardware or Software -Protects HTTP attacks: XSS, SQL Injection -Reverse Proxy |
|
|
Term
|
Definition
-Application Hash -Certificate -Path -Network Zone |
|
|
Term
cbs.log is produced by this |
|
Definition
|
|
Term
|
Definition
Can be used to monitor and alert if there are changes to a file. |
|
|