1-8 Flashcards
has become the most common form of attack besides viruses
blocking
first risk factor of an attack
the attractiveness of a target
second risk factor of an attack
the nature of the information on a system
third risk factor of an attack
the traffic on a system
a numerical system from 1-10 that factors attractiveness, info content, and security devices present. the first 2 are added together and the last is subtracted. the best score one could achieve is
1 attractiveness // 1 info content // 10 security devices present
an organization’s security approach is rarely completely one paradigm or another. it can be primarily perrimiter but still proactive. Or it can be predominately pasive but layered. this is called a
hybrid security approach
one of the oldest pieces of legislation regarding computer security is
computer security act of 1987
this act requires government agencies to id sensitive systems, conduct computer security training, and developed computer security plans
computer security act of 1987
any information, the loss, misuse, or unauthorized access to or modification of which can adversely affect the natural interest or conduct of federal programs or the privacy to which individuals are entitled under section 552a of title 5 US code
sensitive information
this document describes requirements for developing standards for computer systems and for records held by the government
OMB Circular A-130
irongeek.com has a list of
computer crime laws by state
the law that governs how publically traded companies store and report on financial data
SOX
Sponsored by Carnegie Mellon University, it was the first computer incident response team and is still one of the most respected in the industry
CERT
This site is particularly useful since most computers run on Windows OS
Microsoft security tech center
a repository for detailed information on viral outbreaks
F-Secure Corporation