IS 3120 CHAPTER 15 Flashcards
A collection of all the vulnerable points of a system
Attack surface
The security requirement that information be available to authorized users when they want it.
Availability
Process that results in a list of activities necessary for an organization to conduct business operations.
Business impact analysis (BIA).
Multiple countermeasures that an attacker must compromise to reach any protected resource. It is often described as a series of concentric rings around protected resources.
Defense in depth.
A separate network that allows connections from external networks and internal LANs; in most cases, it is separated from each network by a firewall.
Demilitarized zone (DMZ)
A program or dedicated hardware device that inspects network traffic passing through it. It then denies or permits that traffic based on a set of rules determined from a stored configuration.
Firewall
A special team formed to handle security incidents when they occur.
Incident response team (IRT)
The security principle that users possess only the minimum access privileges that need to compete their assigned tasks.
Least privilege
.A method that ranks risks relative to one another
Qualitative risk analysis
A method that associates a dollar value, or cost, with each risk.
Quantitative risk analysis
The likelihood that an attack will successfully expo it a vulnerability.
Risk
The process of identifying and addressing all risks.
Risk management
Any event that results in a violation of any of the “CIA” (confidentiality, integrity, and availability)
Security breach
A countermeasure that protects resources from attack.
Security control
An analysis that identifies known vulnerabilities for which there are no security controls in place.
Security gap analysis