S Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Secure Shell (SSH)

A

Network protocol that uses cryptography to secure communication, remote command line login and remote command execution between two networked computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security as a Service (SecaaS)

A

The next generation of managed security services dedicated to the delivery, over the Internet, of specialized
information-security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security information and event management (SIEM)

A

SIEM solutions are a combination of the formerly disparate product categories of SIM (security information management) and SEM (security event management). SIEM technology provides realtime analysis of security alerts generated by network hardware and
applications. SIEM solutions come as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security metrics

A

A standard of measurement used in management of security-related activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Segregation/separation of duties (SoD)

A

A basic internal control that prevents or detects errors and irregularities by assigning to separate individuals the responsibility for initiating and recording transactions and for the custody of assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sensitivity

A

A measure of the impact that improper disclosure of information may have on an enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Service delivery objective (SDO

A

Directly related to the business needs, SDO is the level of services to be reached during the alternate process mode until the normal situation is restored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Service level agreement (SLA)

A

An agreement, preferably documented, between a service provider and the customer(s)/user(s) that defines minimum performance targets for a service and how they will be measured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shell programming

A

A script written for the shell, or command line interpreter, of an operating system; it is often considered a simple domain-specific programming language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sniffing

A

The process by which data traversing a network are captured or monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social engineering

A

An attack based on deceiving users or administrators at the target site into revealing confidential or sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software as a service (SaaS)

A

Offers the capability to use the provider’s applications running on cloud infrastructure. The applications are accessible from various client devices through a thin client interface, such as a web browser (e.g., web-based email).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Split knowledge/split key

A

A security technique in which two or more entities separately hold data items that individually convey no knowledge of the information that results from combining the items; a condition under which two or more
entities separately have key components that individually convey no knowledge of the plain text key that will be produced when the key components are combined in the cryptographic module.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spoofing

A

Faking the sending address of a transmission in order to gain illegal entry into a secure system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Standard

A

A mandatory requirement, code of practice or specification approved by a recognized external standards organization, such as International Organization for Standardization (ISO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Symmetric key encryption

A

System in which a different key (or set of keys) is used by each pair of trading partners to ensure that no one else can read their messages. The same key is used for encryption and decryption. See also Private Key Cryptosystem.

17
Q

System owner

A

Person or organization having responsibility for the development, procurement, integration, modification, operation and maintenance, and/or final disposition of an information system