Term
|
Definition
A record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area |
|
|
Term
|
Definition
A log that can provide details regarding requests for specific files on a system |
|
|
Term
|
Definition
software that helps prevent computers from becoming infected by different types of spyware |
|
|
Term
|
Definition
Software that can examine a computer for any infections as well as monitor computer activity and scan documents that might contain a virus |
|
|
Term
|
Definition
a log that can track user authentication attempts |
|
|
Term
|
Definition
logs that are the second common type of security related operating system logs |
|
|
Term
|
Definition
Spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if it is spam |
|
|
Term
|
Definition
a device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen |
|
|
Term
CCTV Closed Circuit Television |
|
Definition
Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring |
|
|
Term
XSRF Cross-site request forgery |
|
Definition
An attack that uses the user's web browser settings to impersonate the user |
|
|
Term
|
Definition
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users |
|
|
Term
|
Definition
a door lock that extends a solid metal bar into the door frame for extra security |
|
|
Term
|
Definition
faults in a program that occur while the application is running |
|
|
Term
|
Definition
logs that can document any unsuccessful events and the most significant successful events |
|
|
Term
|
Definition
securing a restricted area by erecting a barrier |
|
|
Term
|
Definition
hardware or software that is designed to prevent malicious packets from entering or leaving computers |
|
|
Term
|
Definition
a software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program |
|
|
Term
|
Definition
using the global positioning system to detect the location of a portable device |
|
|
Term
|
Definition
creating a virtualized environment to simulate the central processing unit and memory to check for the presence of a virus |
|
|
Term
host-based software firewall |
|
Definition
a firewall that runs as a program on a local system to protect it against attacks |
|
|
Term
|
Definition
software that addresses a specific customer situation and often may not be distributed outside that customers organization |
|
|
Term
|
Definition
verifying a user's input to an application |
|
|
Term
|
Definition
a secure storage unit that can be used for storing portable devices |
|
|
Term
|
Definition
a record of events that occur |
|
|
Term
|
Definition
a device that monitors and controls two interlocking doors to a small room (a vestibule) designed to separate secure and non secure areas |
|
|
Term
|
Definition
a general software security update intended to cover vulnerabilities that have been discovered |
|
|
Term
|
Definition
either a program or a feature incorporated within a browser that stops pop-up advertisements from appearing |
|
|
Term
|
Definition
a device that detects an emitted signal in order to identify the owner |
|
|
Term
|
Definition
a technology that can securely erase data from a portable device and reset it to its default factory settings |
|
|
Term
|
Definition
a ruggedized steel box with a lock |
|
|
Term
|
Definition
logs that are considered the primary source of log data |
|
|
Term
|
Definition
a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure |
|
|
Term
|
Definition
software that is a cumulative package of all security updates plus additional features |
|
|
Term
|
Definition
a sequence of bytes (a string) found in the virus as a virus signature |
|
|
Term
|
Definition
using encryption to mask the content of voice communications |
|
|
Term
3 most important elements to secure data |
|
Definition
|
|
Term
Securing devices includes |
|
Definition
physical access security host hardware security mobile device security |
|
|
Term
|
Definition
restricting access to the areas in which equipment is located |
|
|
Term
Physical security hardware |
|
Definition
hardware locks proximity readers access lists mantraps video surveillance fencing |
|
|
Term
|
Definition
combination locks that use buttons which must be pushed in the proper sequence to open the door |
|
|
Term
|
Definition
physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can be easily stolen |
|
|
Term
5 steps in protecting the OS |
|
Definition
Develop the security policy perform host software baselining configure operating system security and settings deploy the settings implement patch management |
|
|
Term
develop the security policy |
|
Definition
security starts with an organization determining what actions must be taken to create and maintain a secure environment |
|
|
Term
perform host software baselining |
|
Definition
standard or checklist against which systems can be evaluated and audited for their security posture
outlines major security considerations for a system and becomes the starting point for solid security
used for each computer |
|
|
Term
|
Definition
|
|
Term
baselines are the OS settings that |
|
Definition
impose how the policy will be enforced |
|
|
Term
Configuring OS security and settings |
|
Definition
Changing any default settings that are insecure
eliminating any unnecessary software, services, or protocols enabling OS system security features |
|
|
Term
|
Definition
collection of security configuration settings |
|
|
Term
Security Template deployment |
|
Definition
manually snapin group policy |
|
|
Term
Security template manually |
|
Definition
requires the administrator to access each computer and apply the security template either through using the command line or through snap-in |
|
|
Term
|
Definition
software module that provides administrative capabilities for a device |
|
|
Term
|
Definition
Microsoft windows feature that provides centralized management and configuration of computers and remote users who are using specific Microsoft Directory services known as active directory
this allows a single configuration to be set and then deployed to many or all users |
|
|
Term
Automatic patch update service |
|
Definition
used to manage patches locally instead of relying upon the vendors online update service |
|
|
Term
|
Definition
anti-virus anti-spam pop-up blockers anti-spyware host based firewalls |
|
|
Term
|
Definition
cleaning the file quarantining deleting |
|
|
Term
|
Definition
matching approach of signature files sent to a database with a sequence of bytes |
|
|
Term
|
Definition
a wild card is allowed to skip bytes or ranges of bytes instead of looking for an exact match |
|
|
Term
|
Definition
mismatches allow a set number of bytes in the string to be of any value regardless of their position in the string |
|
|
Term
|
Definition
list of senders from which no email is to be received |
|
|
Term
|
Definition
create a list from which only email can be received |
|
|
Term
level 1 attachments outlook blocks 80 different file types |
|
Definition
|
|
Term
|
Definition
risky location with restrictive privileges |
|
|
Term
|
Definition
warning message file has been scanned with a validation check and something has been detected in file format |
|
|
Term
|
Definition
packet filter hardware or software that is designed to prevent malicious packets from entering or leaving computers
hardware or software based |
|
|
Term
Windows 7 firewall configurations |
|
Definition
networks public networks home network |
|
|
Term
Computer security log management |
|
Definition
process for generating, transmitting, storing, analyzing, and disposing of computer security log data |
|
|
Term
|
Definition
operations general audits demonstrating compliance with regulations |
|
|
Term
2 Types of security related operating system logs |
|
Definition
log based on system events log based on audit records |
|
|
Term
System events that are commonly recorded are |
|
Definition
client requests and server responses usage information |
|
|
Term
Audit records that are commonly recorded are |
|
Definition
account information operational information |
|
|
Term
Security application logs |
|
Definition
AV Automated patch update service log |
|
|
Term
Application security includes |
|
Definition
application development application hardening and patch management |
|
|
Term
|
Definition
Input validation is not considered the best defense against injection attacks |
|
|
Term
Application hardening and patch management |
|
Definition
intended to prevent exploiting vulnerabilities in software applications |
|
|
Term
|
Definition
security analysis of the transaction within its approved context
Looks not only at security level but also who is requesting it, where it is stored , and when it was requested, and where it is going. |
|
|
Term
|
Definition
fingerprinting to more closely identify important data |
|
|