chapter 2 part 3 Flashcards
what is technical security architecture?
a plan that has all countermeasures including: firewalls, hardened hosts, intrusion detection, etc.
how is legacy security systems best dealt with in a company by IT?
it is not replaced all at once due to cost so instead new security systems are combined with old systems to close as many gaps in the systems security as possible.
defense in dept vs weakest links?
defense in depth: multiple independent countermeasures in series while… weakest links are single countermeasures that when breached allow attacker full access.
what are Central Security Management Consoles used for?
.provides control of all security implemented on all corporate devices (updates, etc from one location). used to counter an attack on a network and is used by the security department. often has to be carefully protected because it is a big vulnerability to the network if broken into.
inter-organizational systems?
two or more companies link networks together, neither can enforce or learn of other security practices.
centralized security management allows for what and why is this attractive?
allows all devices to be secured and updated remotely from one or a few central devices. this makes it easier to enforce security on the network because you don’t have to rely on several employees.
what is corporate security policy?
commitment of firm to strong security
major security policy is what>?
email, hiring, termination etc. strong policies when it comes to what employees should do.
PII ?
personally identifiable info.
personally identifiable info policies.?
specific policies for encryption, access controls.
AUP?
Acceptable use policy: how employees are to use devices and not to use for personal reasons.
policy teams consist of what people?
not just IT or security people as more ppl = more/broader scope of coverage and ideas.
implementation guidance?
limits discretion of implementer to simplify implementations. acts as a guide
baselines?
tells what should be achieved without telling how
promulgation?
the process of making users/employees aware of new security policies