Chapter 3 Flashcards

1
Q

Audit

A

Independent review and examination of records and activities to assess the adequacy of system controls, ensuring compliance with established policies and operational procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Crime Prevention Through Environmental Design (CPTED)

A

architectural approach to design of buildings and space to emphasize passive features to reduce the likelihood of criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defense in Depth

A

Information security strategy that integrates people, technology, operations to establish barriers across multiple layers and missions of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discretionary Access Control (DAC)

A

access control that is left to the discretion of the object’s owner, or anyone else who is authorized to control the object’s access. Owner can determine who should have access rights and what those rights are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layered Defense

A

use of multiple controls arranged in series to provide several consecutive controls to protect an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Linux

A

open source operating system, making source code legally available to end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Log Anomaly

A

System irregularity identified when studied which could represent events of interest for further surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logging

A

Collecting and storing user activities in a log, which is a record of events occurring within an organization’s systems and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Logical Access Control Systems

A

automated system controlling an individual’s ability to access one or more computer system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mandatory Access Control

A

Access control requiring the system itself to manage access controls in accordance with organization’s security policies
Central authority determines access to resources based on predefined security policies and user clearance levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical Access Controls

A

controls implemented through a tangible mechanism- exs: walls, fences, guards, locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mantrap

A

Entrance to a building or area, requiring people to pass through two doors with only one door opened at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Object

A

passive information system-related entity containing or receiving information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Principle of Least Privilege

A

users and programs should only have minimum privileges necessary to complete their tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Privileged Account

A

information system account with approved authorizations of a privileged user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ransomware

A

malicious software locking the computer screen/files, preventing/limiting a user from accessing their system and data until money is paid

17
Q

Role based access control (RBAC)

A

access control system that sets up user permissions based on roles

18
Q

Rule

A

instruction developed to allow or deny access to a system by comparing validated identity of the subject to an access control list

19
Q

Segregation of Duties

A

(also known as Separation of Duties)
ensuring that organization process cannot by completed by one person, reducing insider threats

20
Q

Subject

A

Individual process/device causing information to flow among objects or change to the subject state

21
Q

Technical controls

A

security controls for information system primarily implemented and executed by the information system through mechanisms contained in the hardware, software or firmware components of the system

22
Q

Unix

A

Operating system used in software development

23
Q

User Provisioning

A

process of creating, maintaining, deactivating user identities on a system