Domain 7 Flashcards
Allowed Listing
These systems also alert designated IT security personnel if the attempt involves a resource not on a pre-approved list. Standalone security tools and integrated systems which provide these capabilities are now starting to incorporate anti-malware processes as part of their offerings; similarly, In this course, “blocked list” and “allowed list” replace “blacklist” and “whitelist.” Anti-malware products have begun to incorporate these blocked listing /allowed listing management and use capabilities.
Alternate Site
A general term for a contingency or continuity of operations (COOP) site used to assume system or organizational operations in the event that the primary site is not usable for a period of time.
Backup
A copy of files and programs made to facilitate recovery, if necessary.
Baseline
The total inventory of all of a system’s components, including hardware, software, data, administrative controls, documentation or user instructions. Types of baselines include: Enumerated baselines, which are inventory lists generated by systems cataloging, discovery and enumeration Build Security baselines associate the minimum acceptable set of security controls for each CI within a configuration baseline. Modification, update or patch baselines, which are subsets of a total system baseline. These would contain only those CIs which have been modified. or deployment baselines, which are configuration baselines for instances of a system being built for a specific purpose (such as security assessment) or environment (such as production or delivery to end users). tools. Configuration baselines, which have a revision or version identifier associated with each configuration item (CI).
Baselining
Creating a total inventory of a system, component by component, part by part.
Blocked Listing and Allowed Listing
Use of lists of blocked or allowed identities, whether as users, URLs, URIs, web addresses, IP addresses, geographic regions, hardware addresses, files or programs, as a means of controlling (prohibiting or permitting) their access, use or attempt to load and execute.
Change Management
The formal process an organization uses to transition from the current state to a future state. This typically includes mechanisms to request, evaluate, approve, implement, verify and learn from the change.
Configuration Item
An aggregation of information system components that is designated for configuration management and treated as a single entity in the configuration management process. Item or aggregation of hardware, software, or both, which is designated for configuration management and treated as a single entity in the configuration management process.
Configuration Management (CM)
A collection of activities focused on establishing and maintaining the integrity of information technology products and information systems, through control of processes for initializing, changing and monitoring the configurations of those products and systems throughout the system development lifecycle.
Cyber Forensics
The practice of gathering, retaining and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.
Disaster Recovery
The ability to provide IT services following an interruption, often at an alternate location.
Disruption
An unplanned event that causes an information system to be inoperable for a length of time (e.g., minor or extended power outage, extended unavailable network or equipment or facility damage or destruction).
Egress Monitoring
Monitoring the flow of information out of an organization’s control boundaries.
Entity
Any form of user, such as a hardware device, software daemon, task, processing thread or human, which is attempting to use or access systems resources. Endpoint devices, for example, are entities that human (or nonhuman) users make use of in accessing a system. Should be subject to access control and accounting. See also User and Entity Behavior Analysis.
Eradication
In incident response, the activities which remove the cause of the incident from the environment. This often requires the use of a formal root cause analysis process.
Event
Any observable occurrence in a network or system.
False Positive
Incorrectly classifying a benign activity, system state or configuration as malicious or vulnerable
Forensics, Cyber Forensics
The examination of evidence related to suspected criminal activity. Cyber forensics refers to investigations of such activities involving information systems.
Full Backup
Copies the entire system to backup media.