IA Knowledge VI Flashcards
A computer network made up of local-area networks over a large area (e.g., nation or world) using multiple transmission media.
Wide-area network (WAN)
Self-replicating malicious software that can disrupt networks or computers.
Worm
Malicious code that attaches itself to storage media, documents, or executable files and is spread when the files are shared with others.
Virus
Use open Internet protocols and standards to create stand-alone, modular software called services that are capable of describing themselves and integrating with other similar services.
Web services
The combination of transfer protocol, domain name, directory path, and document name.
Uniform Resource Locator
A secure method of connecting two points on the Internet, often run by an Internet service providers.
Virtual private network (VPN)
A type of firewall that enhances packet filtering by monitoring packet flows in general.
Stateful inspection
Process or transaction-level controls that must be in place for management and governance controls to be effective. They are usually specific to a given application but may also control larger technical processes such as system access rights.
Technical controls
Unsolicited bulk e-mail.
Spam
A network topology in which each device is wired to a central device that routes data to or from other devices, eliminating the need to wire between devices.
Star network
A contract between an organization and a software vendor specifying terms of use.
Software license agreement
Making illegal duplicate copies of software or installation of software beyond what is allowed in a license agreement.
Software piracy
A powerful computer with high bandwidth dedicated to a specific task such as providing access to files or managing the common application needs of an organization.
Server
A software system design that allows for sharing of Web services as needed; a service consumer gets Web services from various service providers.
Service-oriented architecture (SOA)
The overall rules for a database.
Schema
The processes an organization puts into place so that security controls and expenditures are fully commensurate with the risks to which the organization is exposed.
Security risk management
The acceptable levels of variation relative to the achievement of objectives.
Risk tolerance
In terms of networking hardware, an intelligent processor that networks devices using protocols.
Router
A database management system that is arranged into two-dimensional files called tables, with links between tables that share a common attribute.
Relational database
A network topology in which the network is arranged in a circle, so two paths for data are available.
Ring network
In a database, a logical grouping of fields.
Record
A hardware control in which each transmitted data element receives an additional bit (character) of data mathematically related to the data; abnormal changes will void the mathematical relationship.
Redundant character check
Automated error checks built into computer processing as well as segregation of duties such as controlling programmers’ access to files and records. They check that data processing tasks are accurate, complete, and valid.
Processing controls
An encryption method in which two keys are created, private and public. The sender places the public key in a directory or an application automatically applies it to lock sent data; to decrypt the data, the private key must be used
Public key encryption
In a database, a unique key field number (i.e., a proper noun) used to identify a specific entity.
Primary key
An encryption method in which a sender creates an encryption key and sends it to a trusted receiver, who can use it to decrypt all messages in that session.
Private key encryption
In terms of networking hardware, a physical connection point to a device
Port
A type of proactive control that deters undesirable events from occurring.
Preventive control
A type of computer network that is a direct connection between two computers.
Peer-to-peer network
The means of preventing access to an asset such as locks and/or key cards preventing access to a building, to data centers, and to key operational areas.
Physical access controls
A type of firewall that compares source and destination addresses to an allowed list, examining headers and other fields in packets of data.
Packet filtering
The installation of released bug fixes to applications that are already in production.
Patch management
Process or transaction-level controls that find errors and verify the accuracy, completeness and validity of output data after processing is complete.
Output controls
A general term describing a logical grouping of data passing through network layers.
Packet
A method of defining how messages should be sent through a network so that unrelated products can work together.
Open Systems Interconnection (OSI) reference model
The software interface between the hardware and the applications and end user.
Operating system (O/S)
Hardware and software systems on a network that analyze incoming packet content, dropping malicious packets.
Network IPS (NIPS)
Software that allows multiple perspectives for a set of data to be analyzed.
Online analytical processing (OLAP)
Networking hardware that combines multiple channels into a single channel, such as multiple phone lines sharing a single physical phone line.
Multiplexer
Used by firewalls with packet filtering and stateful inspection to hide the internal host computer IP addresses from sniffer utilities.
Network address translation (NAT)
IT controls that determine and mitigate risks to critical assets, sensitive data, or operations, including standards, organizational structure, and physical and environmental controls.
Management controls
Type of processing that is halfway between batch and real-time processing. Creates real-time entries that are posted to a temporary memo file (which allows the updated information to be viewed); at a designated time the memo file is batch-processed to update the master file.
Memo posting
A type of computer network for a limited geographical area such as a building.
Local-area network (LAN)
A large computer capable of supporting massive inputs and outputs and many concurrent users.
Mainframe computer