IS3230 CHAPTER 2 Flashcards
The number of times per year we can expect a compromise to occur is called ___.
ANNUAL RATE OF OCCURRENCE (ARO)
The total cost per year of the threat under assessment. ALE is calculated by multiplying the SLE by the ARO.
ANNUALIZED LOSS EXPECTANCY (ALE)
The relative value, either in monetary terms or in overall impact, of the resource being protected by the access control system is called.
ASSET VALUE
What it costs an organization to obtain or create an asset originally is called ___.
COST OF ATTAINMENT
What an organization would lose if an asset were unavailable. Ex: The organization might lose $50,000 per hour in lost productivity if its internal network went down.
COST OF IMPACT
What it would cost an organization to replace an asset if it were stolen or compromised is called ___.
COST OF REPLACEMENT
An action taken to counter another action is called ___.
COUNTERMEASURE
The approach of using multiple layers of security to protect against a single point of failure is called ___.
DEFENSE-IN-DEPTH STRATEGY
The ability of an attacker to log into a system under one level of access and exploit a vulnerability to gain a higher level of access is called ___.
HEIGHTENED ACCESS
A problem-solving system that uses a set of rules to select the best answer available. In virus scanning, ___ refers to an algorithm that uses a set of rules that is constantly revised based on feedback to determine whether a given file contains a virus.
HEURISTICS
A combination of hardware and software used to analyze network traffic passing through a single point on the network. It is designed to analyze traffic patterns to find suspicious activity is called ___.
INTRUSION DETECTION SYSTEM (IDS)
A combination of a firewall and an IDS. An ___ is designed to analyze network traffic patterns and react in real time to block suspicious activity.
INTRUSION PREVENTION SYSTEM
Used to create secure pathways for data through a public network is called ___.
IP TUNNELING
A network connecting computers and other assets in a small, physical location such as an office, home, or school is called ___.
LOCAL AREA NETWORK (LAN)
The combination of more than one access control method to secure a single resource is called ___.
MULTILAYERED ACCESS CONTROL
Guessing or deciphering passwords is called ___.
PASSWORD CRACKING
Creating legitimate-looking Web sites or emails that trick a user into entering sensitive information such as passwords, Social Security numbers, or credit card numbers is called ___.
PHISHING
The likelihood that an attack will occur is called ___.
PROBABILITY OF OCCURRENCE