IS4680 Chapter 6 Flashcards
Baseline controls
Countermeasures that apply broadly to the entire IT infrastructure.
CAATT - Computer assisted audit tools and techniques
Automated computerized tools and techniques auditors used to aid them in their auditing functions.
CMDB - Configuration management database
A central repository of system configuration items.
ISSAF - Information Systems Security Assessment Framework
A method for evaluation networks, systems, and applications.
IP - Internet Protocol address
A numerical representation that identifies a system node on a computer network.
Network scan
An automated method for discovering host systems on a network.
NIST 800-15
A NIST published technical guide to conducting information security tests and assessments.
OSSTMM - Open Source Security Testing Methodology Manual
A method that takes a scientific approach to security testing.
Risk appetite
The degree of risk that an organization is willing to accept to achieve its goals.
Risk tolerance
The range of acceptance of risks to keep an organization within their appetite for risk.
Rotation of duties
The process of rotating employees into different functions or job roles.
SCM - Security configuration management
The process and techniques around managing security-related configuration items that directly relate to controls or settings.
TCP/IP - Transmission Control Protocol/Internet Protocol
A suite of protocols consisting of four layers, which describes how nodes on networks, including the Internet, interact and communicate.
Vulnerability scan
An automated method for testing a system’s services and applications for known security holes.