12-1 Flashcards
ensuring that the contents of messages will be kept secret
confidentiality of data
one who breaks into a system in order to do something malicious, illegal, or harmful. synonymous with black hat hacker
cracker
assessing the security of a system by attempting to break into the system. this is the activity most penetration testers engage in
penetration testing
a process whereby the attacker tries to find out what is on the target network
enumerating
a product of computer scientists working to improve computer security
SATAN ( Security Tool for Analyzing Networks )
a way of evaluating the security of a network and looking at security as a three-dimensional cube
mcumber cube
the impact a single loss will cause
SLE / Single loss expectancy
asset value
AV
Is a percentage value representing how much of an assets value you will loos in a given incident
EF / Exposure Factor
how much loss you can expect from a particular year. this is the SLE multiplied by the ARO
ALE / Annualized Loss Expectancy
ARO
Annual Rate of Occurrence
how much risk is left
residual risk
what are the 4 categories of response
mitigation
avoidance
transference
acceptance
the steps you take to lessen risk
mitigation
this is difficult to do. it means you have zero risk
avoidance