Ch 15 Key Terms Flashcards
permission to perform a cyber security test
penetration verification acceptance
vulnerability testing authorization
variance
vulnerability verification acceptance
vulnerability testing authorization
calculates the avg amount of time until a component fails
mean time between failures (MTBF)
mean time to failure (MTTF)
Failure in time (FIT)
mean time to recovery (MTTR)
mean time between failures (MTBF)
prevents the threat from coming in contact with a vulnerability
deterrent control
preventive control
executive control
administrative controls
preventive control
average amount of time it will take a device to recover
mean time to failure (MTTF)
Failure in time (FIT)
mean time to recovery (MTTR)
mean time between failures (MTBF)
mean time to recovery (MTTR)
sustained and continual surveillance
secure configuration guides
configuration validation
scalability
continuous monitoring
continuous monitoring
intended to mitigate the damage caused by the incident
detective control
preventive control
corrective control
compensating control
corrective control
propose change of IT systems; approved by the ______
change management chairperson
computer change management
change management board
change management team
change management team
policy that defines the actions users may perform
executive policy
social media network
role-based awareness training
acceptable use policy
acceptable use policy
using technology to automate IT processes
artificial intelligence
automated course of action
automation
IT automation
automation
states how a company plans to protect its IT assets
social media network
role-based awareness training
executive policy
security policy
security policy
of human origin, such as the vandalism of a wireless antenna
physical threat
natural threat
manmade threat
risk assessment
manmade threat
compiled historical data; determine the likelihood of a risk
ARI
ARO
SLE
ALE
ARO
security controls carried out or managed by devices
corrective control
technical controls
compensating control
preventive control
technical controls
intended to minimize security risks of data transmitted across the network
Blanket Purchase Agreement (BPA)
Memorandum of Understanding (MOU)
Interconnection Security Agreement (ISA)
Systems Security Agreement (SSA)
Interconnection Security Agreement (ISA)
a network that moves a product from the supplier to customer
assessment
supply chain assessment
retail assessment
supply chain
supply chain