Card #1 - 50 Flashcards
Grayware
not classified as viruses but can harm the performance of computers on your network
Cisco PIX
helps network security administrators and IT managers for bandwidth monitoring, and Firewall internet security events monitoring efficiently
Spamtrap
a DNS technique used by botnets to hide phising and malware delivery sites behind an ever-changing network of compromised hots acting as proxies
Non-repudiation
provides definitive proof of a sender’s identity and can be used to prevent a party from denying that they took a specific action
Authentication
proving the person is who they say they are
Data Recovery
salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media the not CANNOT be accessed normally
Timing
process of verifying a user’s identity
Networking
science of writing in secret code and is an ancient art
Secret Key Cryptography (SKC)
use for privacy and confidentiality. One key for encryption and another for decryption
Botnets
number of hijacked Internet-connected devices, each of which runs one or more bots, remotely controlled by hackers
3 Factors of Authentication
- Something you know (username/password)
- Something you have (smart cards)
- Something you are (fingerprint, biometrics)
Data Warehouse
a duplicate of some or all of the main database’s data stored on a separate computer from the main database
Cold Site
least expensive type of backup site for an organization to operate
Risk mitigation controls to ensure employee safety
Emergency lighting, drills, escape plans
A denial service attack has occurred. Which questions should be answered during the incident identification phase?
What servers have been compromised?
AND
What is the impact to the business?
Public Key Cryptography
a pair of keys to encrypt and decrypt data to protect it against unauthorized access or use
Surge
a prolong increase in the voltage level
sandbox
a security mechanism for separating running programs
Authorization
a security system validates whether or not a user has permission to complete an action
Exception Handling
implements into application to respond more appropriately to errors and generate an error message when they occur.