security concepts Flashcards
A _____ is a group of honeypots that mimic the functionality of a network
honeynet
A _____ is a server that is intentionally left open or available, so that an attacker will be drawn to it versus a live network.
honeypot
A _____ is a device used to generate, maintain and store cryptographic keys. It can be an external device and can easily be added to a system.
Hardware Security Module (HSM)
The HSM will maintain the integrity of the key.
The _____ is a hardware-based encryption solution that is embedded in the system and provides secure key storage for full disk encryption.
Trusted Platform Module (TPM)
A _____ is a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.
hardware root of trust
_____ is a database de-identification method where all or part of data in a field is substituted with a randomly generated token
Tokenization
A _____ is a hardware device used to encrypt Transport Layer Security (TLS) traffic and should be placed close to the desired off-loading device.
Secure Socket Layer (SSL) Accelerator
_____ is the method of disguising coding methods by way of renaming variables, replacing strings, and hiding code comments.
Code obfuscation
_____ describes the sociopolitical outlook of a nation concerning computing technology and information. Some nations may respect data privacy more or less than others. Care needs to be considered when storing such data.
Data sovereignty
A _____ system can integrate with a mail gateway server to examine the contents of the email or attachments and determine if it can be sent
Data Loss Prevention (DLP)