redo 14 Flashcards
to configure confidentiality rules and policies, log incidents, and compile reports.
policy server
to enforce policy on client computers, even when they are not connected to the network.
endpoint agents
to scan communications at network borders and interface with web and messaging servers to enforce policy.
network agents
sets out procedures and guidelines for dealing with security incidents
incident response policy
making the system resilient to attack in the first place
preparation
determining whether an incident has taken place and assessing how severe it might be, followed by notification of the incident to stakeholders.
detection and analysis
limiting the scope and magnitude of the incident
containment , eradication, recovery
analyzing the incident and responses to identify whether procedures or systems could be improved
post incident activity
is any event that breaches security policy
incident
Larger organizations will provide a dedicated ____________________ as a single point-of-contact for security incidents
Computer Security Incident Response Team (CSIRT)
__________________ means that the evidence cannot be seen with the naked eye; rather, it must be interpreted using a machine or process.
Latent
___ products scan content in structured formats, such as a database with a formal access control model, or unstructured formats, such as email or word processing documents
DLP