Midterm 2 Key Definitions Flashcards
Vulnerability
A flaw or weakness in a program
Exploit
Software code that can be used to take advantage of a flaw and compromise a system
Authentication
Verification of claimed identity
Authorization
Restricting the actions that a user is permitted to perform
Demilitarized Zone (DMZ)
A subnetwork that is accessible from the Internet but separate from the organization’s internal network
Deep Packet Inspection
A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet
Router
A device that uses the Internet Protocol (IP) to send packets across networks
Social Engineering
AN attack that involves deception to obtain access
Firewall
A device that provides perimeter security by filtering packets
Hardening
Improving security by removal or disabling of unnecessary programs and features
CIRT
The set of employees assigned responsibility for resolving problems and incidents
Patch
Code that corrects a flaw in a program
Virtualization
The process of running multiple machines on one physical server
Change control and change management
A plan to ensure that modifications to an information system do not reduce its security
Packet Filtering
The firewall technique that filters traffic by examining only the information in packet headers to test the rules in an ACL
Border Router
The device that connects the organization to the Internet
Vulnerability Scan
A detective control that identifies weaknesses in devices or software
Penetration Test
A dest that determines the time it takes to compromise a system
Patch Management
The process of applying code supplied by a vendor’s software
Cloud Computing
An arrangement whereby a user remotely accesses software, hardware, or other resources via a browser
Virtual Private Network (VPN)
An encrypted tunnel used to transmit information securely across the Internet
Data Loss Prevention (DLP)
A procedure to filter outgoing traffic to prevent confidential information from leaving