12-2 Flashcards
transferring the risk to someone else
transference
if the probability of the risk is very remote, or the cost of mitigation is higher than the cost of the risk being realized, you may choose to do nothing and simply accept the risk
acceptance
a rating system based on attractiveness to hackers, content, and security.
10+10-1
the six stages of assessing a systems security
patch port protect policies probe physical
a computer update
patch
when assessing a systems security, you should check to see whether there is a procedure in place to govern routine updating of all ______________
patches
_______________ means that the OS, Database system, internet browser, etcc are checked for patches
applying patches
once all patches are up to datethe next step is to set up a system to ensure that they are kept __________ date
up to
automated patching system solutions
HFNetChkPro
ZENworks Patch Management
McAfee ePolicy Orchestrator
this system is for windows. recent version turns patching to automatic. it will only update windows. it dows not provide a way to test patches on a test machine
windows update
This product is available from Shavlik ______________ Pro/LT. handles patches automatically. sold per seat license . 5 seat for $200. 100 seat for $2100.
HFNetChkPro
this product is available from Microfocus
ZenWorks Patch Management
hanles automated system management. it monitors the network connected to the machine. prevents rougue machines.
McAfee ePolicy Orchestrator
ports 1 through _______ are assigned and used for well known ports
1024
not only is it important to close unused ports , but ports for unused________
services