Shared Flashcard Set

Details

Security+ 4th ed. Chapter 05
Ciampa's Security+ Guide to Network Security Fundamentals
35
Other
Undergraduate 4
10/27/2011

Additional Other Flashcards

 


 

Cards

Term
Access list
Definition
A record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.
Term
Access log
Definition
A log that can provide details regarding requests for specific files on a system.
Term
Anti-spyware
Definition
Software that helps prevent computers from becoming infected by different types of spyware.
Term
Anti-virus (AV)
Definition
Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus.
Term
Audit log
Definition
A log that can track user authentication attempts.
Term
Audit records
Definition
Logs that are the second common type of security-related operating system logs.
Term
Bayesian filtering
Definition
Spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if it is spam.
Term
Cable lock
Definition
A device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen.
Term
Closed-circuit television (CCTV)
Definition
Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring.
Term
Cross-site request forgery (XSRF)
Definition
An attack that uses the user’s Web browser settings to impersonate the user.
Term
Data loss prevention (DLP)
Definition
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users.
Term
Deadbolt lock
Definition
A door lock that extends a solid metal bar into the door frame for extra security.
Term
Errors (exceptions)
Definition
Faults in a program that occur while the application is running.
Term
Event logs
Definition
Logs that can document any unsuccessful events and the most significant successful events.
Term
Fencing
Definition
Securing a restricted area by erecting a barrier.
Term
Firewall (packet filter)
Definition
Hardware or software that is designed to prevent malicious packets from entering or leaving computers.
Term
Fuzz testing (fuzzing)
Definition
A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.
Term
GPS tracking
Definition
Using the Global Positioning System (GPS) to detect the location of a portable device.
Term
Heuristic detection
Definition
Creating a virtualized environment to simulate the central processing unit (CPU) and memory of the computer to check for the presence of a virus.
Term
Host-based software firewall
Definition
A firewall that runs as a program on a local system to protect it against attacks.
Term
Hotfix
Definition
Software that addresses a specific customer situation and often may not be distributed outside that customer’s organization.
Term
Input validation
Definition
Verifying a user’s input to an application.
Term
Locking cabinet
Definition
A secure storage unit that can be used for storing portable devices.
Term
Log
Definition
A record of events that occur.
Term
Mantrap
Definition
A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas.
Term
Patch
Definition
A general software security update intended to cover vulnerabilities that have been discovered.
Term
Pop-up blocker
Definition
Either a program or a feature incorporated within a browser that stops pop-up advertisements from appearing.
Term
Proximity reader
Definition
A device that detects an emitted signal in order to identify the owner.
Term
Remote wipe/sanitation
Definition
A technology that can remotely erase data from a portable device and reset it to its default factory settings.
Term
Safe
Definition
A ruggedized steel box with a lock.
Term
Security logs
Definition
Logs that are considered the primary source of log data.
Term
Security policy
Definition
A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.
Term
Service pack
Definition
Software that is a cumulative package of all security updates plus additional features.
Term
Signature file
Definition
A sequence of bytes (a string) found in the virus as a virus signature.
Term
Voice encryption
Definition
Using encryption to mask the content of voice communications.
Supporting users have an ad free experience!