Ch.4 Flashcards
a paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area
access list
subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective
activity phase controls
process for developing and ensuring that policies and procedures are carried out, specifying actions that users may do, must do, or cannot do
administrative control
an audible sound to warn a guard of an intruder
alarm
software that helps prevent computers from becoming infected by different types of spyware
antispyware
software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus
antivirus (AV)
a structure designed to block the passage of traffic
barricade
spam filtering software that analyzes every word in an email and determines how frequently a word occurs in order to determine if it is spam
Bayesian filtering
a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications
big data
permitting everything unless it appears on the list; a list of nonapproved senders
blacklist
a device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen
cable lock
having the client web browser perform all validations and error recovery procedures
client-side validation
video cameras and receivers used for surveillance in areas that require security monitoring
closed circuit television (CCTV)
control that provides an alternative to normal controls that for some reason cannot be used
compensating control
control that is intended to mitigate or lessen the damage caused by an incident
corrective control
an attack that uses the user’s web browser settings to impersonate the user
cross-site request forgery (XSRF)
data that is stored on electronic media
data at-rest
data that is in transit across a network, such as an email sent across the internet
data in-transit
a stat of data in which actions upon it are being performed by “endpoint devices” such as printers
data in-use
a system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users
data loss prevention (DLP)
a door lock that extends a solid metal bar into the door frame for extra security
deadbolt lock
detective control
a control that is designed to identify any threat that has reached the system
deterrent control
a control that attempts to discourage security violations before they occur
embedded system
a computer system with a dedicated function within a larger electrical or mechanical system
errors
faults in program that occur while the application is running. also called EXCEPTIONS
exceptions
faults in program that occur while application is running. also called ERRORS
fencing
securing a restricted area by erecting a barrier
firewall
hardware or software that is designed to prevent malicious packets from entering or leaving computers. also called PACKET FILTER
fuzz testing (fuzzing)
a software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program
guard
a human who is an active security element
host-based application firewall
a firewall that runs as a program on local system
hotfix
software that addresses a specific customer situation and often may not be distributed outside that customer’s organization