Ch 9 Key Terms Flashcards
passive devices to restrict access (i.e, fencing, sign, lighting, cage, barricade)
barriers
bollards
cage
fencing
barriers
quality assurance test to verify that the code functions as intended
staging
coding verification
waterfall
Secure DevOps
Staging
a network that moves a product from the supplier to the customer
supply chain
supply change of trust
vendor chain of trust
hardware chain of trust
supply chain
determining an object’s change in position in relation to its surroundings
motion detection
motion reflector
passive IDS
passive IPS
motion detection
helps prevent computers from becoming infected by different types of spyware
antispyware
antimalware
antivirus
nospyware
antispyware
tools that examine the software without actually executing the program
static program analyzers
random program analyzers
secure program analyzers
statistical programing tools
static program analyzers
publicly released software security update intended to repair a vulnerability
security patch
MS Patch Tuesday
patch updates
windows updates
security patch
tools that test for vulnerabilities
security automation
continuous integration
Secure DevOps
baselining
security automation
to tighten security during the design and coding of the OS; aka a trusted OS
OS hardening
OS tightening
hardware system security
trusted OS
OS hardening
transmit a signal to a specific and limited set of receivers (CCTV)
video surveillance cameras
security monitoring cameras
video monitoring security systems
CCTV
video surveillance cameras
a fenced secure waiting station area
cage
barr
fence
Faraday cage
cage
commonly used in smaller electronic devices like smartphones, digital cameras and tablets
microSD
mini data storage
macroSD
microStorage
microSD
once a value or configuration is employed as part of an application it is not modified
immutable systems
waterfall model
modification verification model
agile model
immutable systems
usually a tall, permanent structure to keep out individuals for maintaining security
fencing
barriers
bollards
buriers
fencing
creating a plan for documenting changes to the application
change management
plan documentation management
plan management
life cycle
change management
removing a resource that is no longer needed
Deprovisioning
Provisioning
life cycle management
life cycle
Deprovisioning
securing the supply chain where hardware is manufactured and delivered
hardware system security
hardware chain of trust
supply change of trust
trusted configuration
hardware chain of trust
uses internal storage and external SD cards to record photographs and capture video
digital camera
digital camcorder
Secure Digital
microSD
digital camera
securing booting tools, a hardware root of trust and preventing electromagnetic spying
protecting hardware
protecting software
hardware
fiber
protecting software
follows the agile model and heavily incorporates security concepts
Secure DevOps
agile model
waterfall model
ANUS +
agile model