Messer test 2 review Flashcards
of instances that an event would occur in a year
ARO (annualized rate of occurrence)
expected cost of all events in a single year
ALE (annual loss expectancy)
monetary loss if a single event occurs
SLE (single loss expectancy)
time required to repair a product or system after a failure
MTTR (mean time to repair)
state what is the SLE, ARO and ALE:
if it costs $1,000 to replace a single laptop and you expect to lose 7 in a year, the ___ for laptop theft is $7,000
SLE (single loss expectancy): $1,000 cost of one laptop
ARO (annualized rate of occurrence): 7 laptops in a year
ALE (annual loss expectancy): for laptop theft is $7,000
process of gathering info from outside sources, like social media sites and online forums usually for pen test
passive scan
associated with development life cycle model that focuses on rapid development and constant collaboration
agile
commonly used to control flow of people through particular area. unlocking one door restricts the other from opening
access control vestibule
used to block electromagnetic fields, useful in environments where electromagnetic and radio signals are an issue
faraday cage
physically secure cabled network
protected distribution system (PDS)
describes relationship with IT and their customers
stakeholder management
list of everyone who needs to be contacted during an incident
communication plan
specify the type and amount of data that must be backed up and stored
retention policies
security control commonly implemented on routers to allow or restrict traffic flows through the network
access control list (ACL)
method of modifying the source and/or destination IP addresses of network traffic
NAT (network address translation)
series of security levels (public, private, secret) assigns those levels to EACH object in OS. Users are assigned a security level and only would have access to objects that meet or are below that assigned security level
mandatory access control
determines access based on a series of system enforced rules
rule based AC
assigns a user’s permissions based on their role in the organization
role based
EMI
electromagnetic interference
high end cryptographic hardware designed for large scale secured storage on the network. usually it’s own server
hardware security module (HSM)
hardware that is part of computer’s motherboard is designed to assist and protect with cryptographic functions. full disk encryption (FDE) can use burned in ____ keys to verify that the local device hasn’t changed and there are security features in ___ that prevent brute force or dictionary attacks against full disk encryption login crews
trusted platform module (TPM)
describes how company assets are to be used, especially computers, internal connections and mobile devices
acceptable use policy (AUP)
preparation, identification, containment, eradication, recovery and lessons learned
incident response (IR)
systems designed to identify sensitive data transfers. if ___ finds suspicious forwarding of data, ___ can block it
data loss prevention (DLP)