Chapter_2 vocab Flashcards

1
Q

comprehensive security?

A

all routes of attack to systems are closed to attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how often should firewall logs be read and what is logged?

A

should be read daily. all provable attack packets are blocked and logged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

weakest-link?

A

failure of a single element of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are processes?

A

planned series of actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the plan, protect and respond cycle?

A

plan based protection and response to attacks on a network following a specific plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

protect portion of the IT cycle is what?

A

plan-based creation and operation of countermeasures .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SDLC?

A

systems development life cycle: planning - implementation of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Response portion of IT security?

A

Response: recovery according to plan.

a plan is created ahead of time so that if there is an incident then the IT staff can respond quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SNMP?

A

Simple Network Management Protocol: used by most organizations to access and manage thousands of devices remotely. get command’ allows remote viewing of issues, set command’ allows remote uploading of programs etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

describe how IT security is planned for a corp?

A

1st look at current security, then look at driving forces that will cause changes like: a merger, corporate structure changes and compliance laws and regulations. 3rd look at all resources and classify by sensitivity. 4th identify gaps in security and create plans to fix them based on highest reward 1st.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

driving forces?

A

things that require a firm to change its security planning, protections and response such as a company merger, new products or servers taken on, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

compliance laws and regulations are what?

A

laws usually in place to force companies to protect documentation and identity information of customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

material control deficiency?

A

when it is very likely that in the yearly financial statement there will be material misstated and not be detected. this is a security risk and is mandated by law to be prevented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FISMA?

A

federal information security management act: continuous monitoring of all gov. info that is contracted out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FTC?

A

Federal Trade Commission: prosecutes firms that do not protect private info. of clients.also requires yearly security audits of firms if in violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what companies must stand with the standards of the PCI-DSS? what is this

A

PCI-DSS: payment card industry-data security standard: anyone that accepts credit cards. requirements.

17
Q

FISMA is what? who uses it?

A

Federal Information security Management Act: all gov. agencies or IT companies/ areas where gov. info is stored must be audited yearly and then is certified. if a higher level of security is needed then the organization must be accredited by being checked by an accrediting org. then the company/ organization is (ATO) authorized to operate.

18
Q

CSO?

A

chief security officer

19
Q

what job does the CSO hold?

A

Chief Security Officer: head of security I.T department sometimes called: Chief information Security Officer

20
Q

CIO?

A

Chief Information officer: the highest positing in IT department.