Exam 1 Flashcards
Process of Auditing A Network or Application for Known Exploits
Vulnerability Scanning
Control Designed to Physically or Logically restrict unauthorized access
Preventative Control
Method of Assessing the Security of Systems available to an insider
Credentialed Scan
Preventing an incident from spreading to other areas
Containment
The art of making a message difficult to understand
Ohdufucation
The only truly unbreakable encryption mechanism
One-Time Pad
Document that shows a red team has obtained permission to perform a penetration test
Personal Letter of authorization - Get out of jail free card
Property that an encryption key should not be derivable from the ciphertext
Confusion
Control Designed to discourage an attacker from attempting an attack
Deterrent
Action taken to reduce the likelihood of a threat occuring
Mitigation
Completely removing the cause of an incident
eradication
Process of returning to normal operations following and incident
Recovery
Security principle that states data should only be modified by authorized individuals
Integrity
Control designed to identify and record any attempted intrusions
Detective
Property that predictable features of the plaintext should not be evident in the ciphertext
Difusion
Limits established for security assessments
Rules of engagement
Goal of ensuring that someone cannot deny sending or creating certain data
Non Repudiation
Security tool used to lure attackers away from actual network systems
Honey Pot
Documents that detail requirements for protecting technology and information assets
Security Policy
Member of an incident response team who initially takes charge
First Responder