Domain 7: Business Continuity & Disaster Recovery Flashcards
Pseudoflaw
An intentionally designed vulnerability used to lure in an attacker
Honeynet
A network set up with intentional vulnerabilities to invite attacks and reveal attackers’ methods.
Honeypot
A system set up with intentional vulnerabilities
Darknet
A monitored network without any hosts
Forensics
The process of collecting, preserving, examining, analyzing, and presenting evidence.
Chain of Custody
This establishes proof that the items of evidence collected at the crime scene is the same evidence that is being presented in a court of law. Establishes integrity.
Cluster
Fixed length block of disk space.
File System Metadata
Metadata that is created by the operating system and includes file attributes and security permissions.
Logging Challenges
Volume, noise, variety of formats, interpretation, and privacy.
Trend/Variance Detection Decision Engine
Log analysis tool that Identifies anomalies is system or user behavior