Chapter 2.3 Flashcards

1
Q

asset management

A

An asset management process takes inventory of and tracks all of the organization’s critical systems, components, devices, and other objects of value. It also involves collecting and analyzing information about these assets so that personnel can make more informed changes, or otherwise work with assets to achieve business goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

KPI

A

Key performance indicators (KPI) can be used to determine the reliability of each asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BIA

A

Business impact analysis (BIA) is the process of assessing what losses might occur for each threat scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Border firewalls

A

Border firewalls filter traffic between the trusted local network and untrusted external networks, such as the Internet. DMZ (Demilitarized Zone) configurations are established by border firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internal firewalls

A

Internal firewalls can be placed anywhere within the network, either inline or as host firewalls, to filter traffic flows between different security zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

whole network firewalls

A

Whole network firewalls are put into place to protect the whole network. They are placed inline in the network and inspect all traffic that passes through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

single host firewalls

A

Single host firewalls are installed on the host and only inspect traffic destined for the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

automated alerts

A

If a threshold is exceeded (a trigger), an automated alert or alarm notification must take place. A low priority alert may simply be recorded in a log. A high priority alarm will create an active notification, such as emailing a system administrator or triggering a physical alarm signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

thresholds

A

Thresholds are points of reduced or poor performance or change in configuration (compared to the baseline) that generate an administrative alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

baseline

A

A baseline establishes (in security terms) the expected pattern of operation for a server or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Log analysis

A

Not all security incidents will be revealed by a single event. One of the features of log analysis and reporting software should be to identify trends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly