Chapter_2 vocab Flashcards
comprehensive security?
all routes of attack to systems are closed to attackers.
how often should firewall logs be read and what is logged?
should be read daily. all provable attack packets are blocked and logged.
weakest-link?
failure of a single element of a system.
what are processes?
planned series of actions
what is the plan, protect and respond cycle?
plan based protection and response to attacks on a network following a specific plan.
protect portion of the IT cycle is what?
plan-based creation and operation of countermeasures .
SDLC?
systems development life cycle: planning - implementation of security.
Response portion of IT security?
Response: recovery according to plan.
a plan is created ahead of time so that if there is an incident then the IT staff can respond quickly.
SNMP?
Simple Network Management Protocol: used by most organizations to access and manage thousands of devices remotely. get command’ allows remote viewing of issues, set command’ allows remote uploading of programs etc.
describe how IT security is planned for a corp?
1st look at current security, then look at driving forces that will cause changes like: a merger, corporate structure changes and compliance laws and regulations. 3rd look at all resources and classify by sensitivity. 4th identify gaps in security and create plans to fix them based on highest reward 1st.
driving forces?
things that require a firm to change its security planning, protections and response such as a company merger, new products or servers taken on, etc.
compliance laws and regulations are what?
laws usually in place to force companies to protect documentation and identity information of customers.
material control deficiency?
when it is very likely that in the yearly financial statement there will be material misstated and not be detected. this is a security risk and is mandated by law to be prevented.
FISMA?
federal information security management act: continuous monitoring of all gov. info that is contracted out.
FTC?
Federal Trade Commission: prosecutes firms that do not protect private info. of clients.also requires yearly security audits of firms if in violation.