Chapter 4 Flashcards
Provides us with the means to trace activities in our environment back to their source.
Accountability
Accountability depends on _____________, _____________, and ____________ being present so that we can know who a given transaction is associated with, and what permissions were used to allow them to carry it out.
Identification
Authentication
Access Control
A situation in which an individual is unable to successfully deny that they have made a statement or taken action, generally because there is sufficient evidence that they did it.
Nonrepudiation
People knowing that they’re being monitored and knowing there will be penalties for acting against the rule are an example of what?
Deterrence
IDS
Intrusion Detection Systems
IPS
Intrusion Prevention Systems
Monitors and reports malicious activities
Intrusion Detection Systems (IDS)
Sets off an alarm and takes action when malicious events occur
Intrusion Prevention Systems (IPS)
A subset of auditing that focuses on observing information about an environment to discover undesirable conditions such as failures, resource shortages, and security issues
Monitoring
A methodical examination and review of an organization’s records
Auditing
______ gives you a history of the activities that have taken place in an environment
Logging
Tests that find and fix vulnerabilities before any attackers do
Assessments
When you mimic the techniques an actual attacker would use to breach a system
Penetration Testing (Pen Test)
Pen Test
Penetration Testing