Key Terms Flashcards
What is access control?
The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises
What is a vulnerability scanner?
A piece of software designed to scan a system to determine what services the system is running and whether any unnecessary open ports, operating systems and applications, or back doors can be exploited because of a lack of patching or other flaw.
What is a vulnerability assessment?
An assessment that attempts to discover all potential weaknesses for an asset. Often designed for a third party to come into an organisation, take stock of the assets that will be covered within the scope of the assessment, conduct scans and other tests against those assets, and provide a report of the vulnerabilities that have been found.
What is a vulnerability?
A weakness in a system or asset, such as a flaw in software code; it can also be considered to be a lack of protection for an asset, such as an unlocked server room door.
What is threat modeling?
A threat assessment that attempts to determine all possible vectors of attack and includes risk factors that may affect the ability of a threat actor to initiate or complete a threat event.
What are the 5-whys?
A technique used to determine an issue’s root causes. It involves asking the question “Why?” repeatedly until the root causes are identified.
What is A/B testing?
A statistical way of comparing two (or more) techniques, typically an incumbent against a new rival. A/B testing aims to determine not only which technique performs better but also whether the difference is statistically significant. A/B testing usually considers only two techniques using one measurement but can be applied to any finite number of techniques and measures.
What is a threat actor/agent?
An entity that has the intent to initiate a threat event. This doesn’t have to be a person; it could also be in nature, in the case of a natural disaster.
What is Acceptable interruption window (AIW)?
The maximum period of time that a system can be unavailable before compromising the achievement of the enterprise’s business objectives
What is Abend?
An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing
What is Acceptance criteria?
Criteria that a solution must satisfy to be accepted by customers
What is Acceptance testing?
Testing performed to determine whether a customer, acquirer, user, or their designee should accept a solution
What is a Access control list?
An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals
What is a Access control table?
An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals
What are Access rights?
The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy