Midterm 2 Key Definitions Flashcards

1
Q

Vulnerability

A

A flaw or weakness in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploit

A

Software code that can be used to take advantage of a flaw and compromise a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Verification of claimed identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization

A

Restricting the actions that a user is permitted to perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Demilitarized Zone (DMZ)

A

A subnetwork that is accessible from the Internet but separate from the organization’s internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deep Packet Inspection

A

A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Router

A

A device that uses the Internet Protocol (IP) to send packets across networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering

A

AN attack that involves deception to obtain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall

A

A device that provides perimeter security by filtering packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hardening

A

Improving security by removal or disabling of unnecessary programs and features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIRT

A

The set of employees assigned responsibility for resolving problems and incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Patch

A

Code that corrects a flaw in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtualization

A

The process of running multiple machines on one physical server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Change control and change management

A

A plan to ensure that modifications to an information system do not reduce its security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Packet Filtering

A

The firewall technique that filters traffic by examining only the information in packet headers to test the rules in an ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Border Router

A

The device that connects the organization to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vulnerability Scan

A

A detective control that identifies weaknesses in devices or software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Penetration Test

A

A dest that determines the time it takes to compromise a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Patch Management

A

The process of applying code supplied by a vendor’s software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cloud Computing

A

An arrangement whereby a user remotely accesses software, hardware, or other resources via a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Virtual Private Network (VPN)

A

An encrypted tunnel used to transmit information securely across the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data Loss Prevention (DLP)

A

A procedure to filter outgoing traffic to prevent confidential information from leaving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Digital Signature

A

A hash encrypted with the creator’s private key

24
Q

Digital Certificate

A

Used to store an entity’s public key, often found on web sites

25
Data Masking
Replacing real data with fake data
26
Symmetric encryption
An encryption process that uses the same key to both encrypt and decrypt
27
Spam
Unwanted email
28
Plaintext
A document or file that can be read by anyone who accesses it
29
Hashing
A process that transforms a document or file into a fixed length string of data
30
Ciphertext
A document or file that must be decrypted to be read
31
Information Rights Management (IRM)
Software that limits what actions (read, copy, print, etc.) users granted access to a file or document can perform
32
Certificate Authority
A company that issues pairs of public and private keys and verifies the identity of the owner of those keys
33
Non-repudiation
The inability to unilaterally deny having created a document or file or having agreed to perform a transaction
34
Digital Watermark
A secret mark used to identify proprietary information
35
Asymmetric Encryption
An encryption process that uses a pair of matched keys, one public and the other private. Either key can encrypt something, but only the other key in that pair can decrypt it
36
Key Escrow
A copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable
37
Business Continuity Plan (BCP)
A plan that describes how to resume business operations after a major calamity, like Hurricane Katrina, that destroys not only an organization’s data center but also its headquarters.
38
Completeness Check
An application control that ensures that a customer’s ship-to address is entered in a sales order.
39
Hash Total
A batch total that does not have any intrinsic meaning.
40
Incremental Daily Backup
A daily backup procedure that copies only the activity that occurred on that particular day.
41
Archive
A file used to store information for long periods of time
42
Field Check
A data-entry application control that could be used to verify that only numeric data is entered into a field.
43
Sign Check
An application control that verifies that the quantity ordered is greater than 0.
44
Cold Site
A disaster recovery plan that contracts for use of an alternate site that is pre-wired for Internet connectivity but has no computing or network equipment
45
Limit Check
An application control that tests whether a customer is 18 or older.
46
Zero-Balance Test
An application control that makes sure an account does not have a balance after processing.
47
Recovery Point Objective (RPO)
The amount of data an organization is willing to re-enter or possibly lose in the event of a disaster
48
Recovery Time Objective (RTO)
A measure of the length of time that an organization is willing to function without its information system.
49
Record Count
A batch total that represents the number of transactions processed.
50
Validity Check
An application control that verifies that an account number entered in a transaction record matches an account number in the related master file.
51
Check Digit Verification
A data-entry application control that verifies the accuracy of an account number by recalculating the last number as a function of the preceding numbers.
52
Closed-Loop Verification
A data-entry application control that displays the value of a data item and asks the user to verify that the system has accessed the correct record.
53
Parity Checking
A control that verifies that all data was transmitted correctly by counting the number of odd or even bits.
54
Reasonable Test
An application control that validates the correctness of one data item in a transaction record by comparing it to the value of another data item in that transaction record.
55
Financial Total
A batch total that represents the total dollar value of a set of transactions.
56
Turnaround Document
A document sent to an external party and subsequently returned so that preprinted data can be scanned rather than manually reentered.