Security+ Glossary Flashcards
layered security
An approach to operational security that incorporates many different avenues of defense
security auditing
The act of performing an organized technical assessment of the security strengths and weaknesses of a computer system to ensure that the system is in compliance
deep web
Those portions of the World Wide Web that are not indexed by standard search engines.
application whitelisting
The practice of allowing approved programs to run on a computer computer network or mobile device
stream cipher
A relatively fast type of encryption that encrypts data one bit at a time
protocol analyzer
This type of diagnostic software can examine and display data packets that are being transmitted over a network
aggregation switch
A network device that combines switches together in a network.
Enhances redundancy and increases bandwidth.
VM sprawl
One of 3 virtualization risks
Situation where the number of virtual machines exceeds the organization’s ability to control or manage all of those virtual machines
X.509
A standard for formatting digital certificates that defines the structure of a certificate with the information that was provided in a CSR
controls
Countermeasures that avoid mitigate or counteract security risks due to threats and attacks
packet analyzer
A device or program that monitors network communications on the network wire or across a wireless network and captures data
endpoint protection
Software that incorporates anti-malware scanners into a larger suite of security controls
DSU
Data Service Unit
Device used to establish connectivity between a LAN and a WAN.
static code analysis
The process of reviewing source code while it is in a static state i.e. it is not executing
incremental backup
A backup type in which all selected files that have changed since the last full or incremental backup (whichever was most recent) are backed up
access recertification
A security control where user access privileges are audited to ensure they are accurate and adhere to relevant standards and regulations.
rule-based access control
A non-discretionary access control technique that is based on a set of operational rules or restrictions
model verification
The process of evaluating how well a software project meets the specifications that were defined earlier in development
XTACACS
An extension to the original TACACS protocol
COBIT 5
A framework for IT management and governance created by ISACA
stress testing
A software testing method that evaluates how software performs under e.xtreme load
data retention
The process of maintaining the existence of and control over certain data in order to comply with business policies and/or applicable laws and regulations
whitelisting
The practice of allowing approved progran1s to run on a computer computer network or mobile device
prevention
The security approach of blocking unauthorized access or attacks before they occur
data at rest
Information that is primarily stored on specific media rather than moving from one medium to another
recovery agent
An individual with the necessary credentials to decrypt files that were encrypted by another user
spatial database
A collection of information that is optimized for data that represents objects contained in a geometric space
stateful firewall
A firewall that tracks the active state of a connection and can make decisions based on the contents of a network packet as it relates to the state of the connection
least privilege
The principle that establishes that users and software should have the minimal level of access that is necessary for them to perform the duties required of them
proxy
A device that acts on behalf of one end of a network connection when communicating with the other end of the connection
secure IMAP
A version of the Internet Message Access Protocol that uses SSL or TLS to provide secure communications between a mail client and the mail server
stateless firewalI
A firewall that does not track the active state of a connection as it reaches the firewall
anti-spam
A program that will detect specific words that are commonly used in spam messages
versioning
The practice of ensuring that the assets that make up a project are closely managed when it comes time to make changes
airgap
A physical security control that provides physical isolation.
Systems separated by an air gap typically don’t have physical connections to other systems.
networking enumerator
A device or program that can identify the logical topology of a network to reveal its connection pathways
VPN concentrator
A single device that incorporates advanced encryption and authentication methods in order to handle a large number of VPN tunnels
flood guard
A security control in network switches that protects hosts on the switch against SYN flood and ping flood DoS attacks.
OCSP stapling
A method of checking the status of digital certificates where a web server queries the OCSP server at specific .intervals and the OCSP server responds by providing a time stamped digital signature. The web server appends this signed response to the SSL/TLS handshake with the client so that the client can verify the certificate’s status
anti-malware software
A category of software programs that scan a computer or network for known viruses Trojans worms and other malicious software.
shimming
The process of developing and implementing additional code between an application and the operating system to enable functionality that would otherwise be unavailable
loss controls
Security measures implemented to prevent key assets from being damaged
scheduling
A method used by load balancers to determine which devices should have traffic muted to them
hardening
A security technique in which the default configuration of a system is altered to protect the system against attacks
data in use
Information that is currently being created deleted read from or written to
DevOps
A combination of software development and systems operations and refers to the practice of integrating one discipline with the other
intranet
A private network that is only accessible by the organization’s own personnel
business continuity
A collection of processes that enable an organization to maintain normal business operations in the face of some adverse event.
reverse engineering
The practice of deconstructing software into its base components so that its properties are easier to understand
router
A device that connects multiple networks that use the same protocol
continuous monitoring
The practice of Constantly scanning an environment for threats vulnerabilities and other areas of risk
anomaly-based monitoring
A network monitoring system that uses a baseline of acceptable outcomes or event patterns to identify events that fall outside the acceptable range.
supply chain
The end-to-end process of supplying manufacturing distributing and finally releasing goods and services to a customer
auditing
The portion of accounting that entails security professionals examining logs of what was recorded.
sanitization
A data disposal method that completely removes all data from a storage medium at the virtual level
data sovereignty
The sociopolitical outlook of a nation concerning computing technology and information
technical controls
Hardware or software installations that are implemented to monitor and prevent threats and attacks to computer systems and services
fault tolerance
The ability of a computing environment to withstand a foreseeable component failure and continue to provide an acceptable level of service
privilege management
The use of authentication and authorization mechanisms to provide an administrator with centralized or decentralized control of user and group role-based privilege management
honeynet
An entire dummy network used to lure attackers
device
A piece of hardware such as a. computer server printer or smartphone
resource exhaustion
A software vulnerability that can occur when software does not properly restrict access to requested or needed resources
application blacklisting
The practice of preventing undesirable programs from running on a computer computer network or mobile device
security framework
A conceptual structure for security operations within the organization
security assessment
The process of testing security controls through a comprehensive set of techniques aimed at exposing any weaknesses or gaps in your tools technologies services and operations
standard
A document that defines how to measure the level of adherence to a policy.
administrative controls
Define the human factor(s) of security.
They use methods mandated by organizational policies or other guidelines. This includes:
- Security education training and awareness programs
- Acceptable use policies
- Risk and vulnerability assessments
- Penetration testing
- Bring your own device (BYOD) policies
- Password management policies
- Incident response plans (which will leverage other types of controls)
- Personnel management controls (recruitment, account generation, etc.).
agile
A software development life cycle model that focuses on the collaborative interaction between customers, developers, and testers
Compare with waterfall.
honeypot
A security tool used to lure attackers away from the actual network components. Also called a decoy or sacrificial lamb
directory service
A network service that stores identity information about all the objects in a particular network inchiding users groups servers client computers and printers
differential backup
A backup type in which all selected files that have changed since the last full bach-up are backed up
malware sandboxing
The practice of isolating malware in a viitual environment where it can be safely analyzed without compromising production systems or the rest of the network
data security
The security controls and measures taken to keep an organization’s data safe and accessible and to prevent unauthorized access to it
first responder
The first experienced person or team to arrive at the scene of an incident
embedded system
A computer hardware and software system that has a specific function within a larger system
identity federation
The practice of linking a single identity across multiple disparate identity management systems
baseline report
A collection of security and configuration settings that are to be applied to a particular system or network in the organization.
Personal Identity Verification card
A smart card that meets the standards for FIPS 201 in that it is resistant to tampering and provides quick electronic authentication of the card’s owner
network segregation
The general practice of keeping networks separate from one another.
hotfix
A patch that is often issued on an emergency basis to address a specific security flaw
collision
The act of two different plain text inputs producing the same exact cipher-text output
affinity
A scheduling approach used with load balancers.
Uses client’s IP address to ensure the client is redirected to the same server during a session.
fuzzing
A dynamic code analysis technique that involves sending a running application random and unusual input so as to evaluate how the app responds
telephony
Technology that provides voice and video communications through devices over a distance
warm site
A location that is dormant or performs non critical functions under normal conditions but which can be rapidly converted to a key operations site if needed
SSL/TLS accelerator
A hardware interface that helps offload the resource-intensive encryption calculations in SSL/TLS to reduce overhead for a server
separation of duties
Security principle that prevents any signle person or entity from controlling all the functions of a critical or sensitive process.
Designed to prevent fraud, theft, and errors
keystroke authentication
A type of authentication that relies on detailed information that describes exactly when a keyboard key is pressed and released as someone types information into a computer or other electronic device
antispoofing
A technique for identifying and dropping packets that have a false source address.
In a spoofing attack, the source address of an incoming packet is changed to make it appear as if it is coming from a known, trusted source.
deciphering
The process of translating ciphertext to plaintext
network adapter
Hardware that translates the data between the network and a device
VM escape
One of 3 virtualization risks
An attack that allows attacker to access host system from within virtual system.
Attacker can run code on virtual system and interact with hypervisor
Successful attack can give attacker unlimited control over host system and each VM
Important to keep patch levels current on both physical and virtual servers
privilege bracketing
The task of granting privileges to a user only when needed and revoking them as soon as the task is done
snapshot
The state of a virtual machine at a specific point in time
captive portal
A web page that a client is automatically directed to when connecting to a network usually through public WI-FI.
network loop
The process of multiple connected switches bouncing traffic back and forth for an indefinite period of time
information security triad
The three basic principles of security control and management: confidentiality integrity and availability. Also known as the CIA triad, information security triad or triple triad

token
An authentication device or file. A hardware token is a physical device used in something you have a factor of authentication. A software token is a small file used by authentication services to indicate a user has logged on.
normalization
A software development technique that tries to repair invalid input to strip any special encoding and automatically convert the input to a specific format that the application can handle
immutable system
System that cannot be changed
Once it’s created and tested then deplyed into a production environment
Example: creation of a secure image of a server for specific purpose that is deployed as an immutable system to ensure it stays secure
message digest
The value that results from hashing encryption. Also known as hash value or message digest
anti-spyware
Software that is specifically designed to protect systems against spyware attacks
rooting
The process of enabling root privileges on an Android device
behavior-based monitoring
A network monitoring system that detects changes in normal operating data sequences and identifies abnormal sequences.
account policy
Document that specifies an organization’s requirements for managing accounts
firewall
A software or hardware device that protects a system or network by blocking unwanted network traffic
hot site
A fully configured alternate network that can be online quickly after a disaster
private root CA
A root CA that is created by a company for use primarily within the company itself
correction controls
A security mechanism that helps mitigate the consequences of a threat or attack from adversely affecting the computer system
recovery
The act of recovering vital data present in files or folders from a crashed system or data storage devices when data has been compromised or damaged
Wi-Fi Direct
Technology that enables two mobile devices to connect to each other without a wireless access point
security through obscurity
The practice of attempting to hide the existence of vulnerabilities from others
microcontroller
An embedded systems component that consolidates the functionality of a CPU memory module and peripherals. Also known as system on chip (SoC)
asset management
The process of taking inventory of and tracking all of an organization’s objects of value.
spam
An email-based threat that floods the user’s inbox with emails that typically carry unsolicited advertising material for products or other spurious content and which sometimes deliver viruses. It can also be utilized within social networking sites such as Facebook and Twitter
signature-based monitoring
A network monitoring system that uses a predefined set of rules provided by a software vendor or security personnel to identify events that are unacceptable
bridge
A device similar to a switch that has one port for incoming traffic and one port for outgoing traffic.
compliance
The practice of ensuring that the requirements of legislation regulations industry codes and standards and organizational standards are me
elasticity
The property by which a computing environment can instantly react to both increasing and decreasing demands in workload
persistence
A penetration testing technique where the tester has concluded the initial exploitation and is now interested in maintaining access to the network
cellular network
A connection method that enables mobile devices to connect to wireless transceivers in fixed locations all over the world.
biometrics
Authentication schemes based on individuals’ physical characteristics.
load balancer
A network device that distributes the network traffic or computing workload among multiple devices in a network
packet sniffing
An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet
session key
A single-use symmetric key used for encrypting all messages in a series of related communications
identification
The process of claiming some information about the nature of a paiticular entity
trust model
A single CA or group of CAs that work together to issue digital certificates
geotagging
The process of adding geographic location metadata to captured media such as pictures or videos
CIA triad
The three basic principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.

shibboleth
An identity federation method that provides single sign-on capabilities and enables websites to make informed authorization decisions for access to protected online resources
media
A method that connects devices to the network and carries data between devices.
mutual authentication
A security mechanism that requires that each party in a communication verifies the identity of every other party in the communication
network-based firewalls
A hardware/ software combination that protects all the computers on a network behind the firewall
input validation
Limits what data a user can enter into specific fields like not allowing special characters in a user name field
grey box test
A penetration test where the tester may have knowledge of internal architectures and systems or other preliminary information about the system being tested
plaintext
Un-Encrypted data that is meant to be encrypted before it is transmitted or the result of decryption of encrypted data
impersonation
A type of social engineering in which an attacker pretends to be someone they are not typically to pretend to be average user in distress or a help desk representative
blacklisting
The practice of preventing undesirable programs from running on a computer computer network or mobile device
virtualization
Technology that allows you to host multiple virtual machines on a single physical system
Different types include:
- Type I
- Type II
- Container

network isolation
The general practice of keeping networks separate from one another
Telnet
A network protocol that enables a client to initiate remote command access to a host over TCP/ IP
MD5
A hash algorithm based on RFC 1321 that produces a 128-bit hash value and is used in IPSec policies for data authentication
private key
The component of asymmetric encryption that is kept secret by one party during two-way encryption
three-way handshake
The process by which a TCP connection is completed between two hosts where a host sends a SYN packet to the host it needs to communicate with that host sends a SYN ACK packet back and the originating host sends an ACK packet to complete the connection
degaussing
A data disposal method that applies a strong magnetic force to a disk drive so that it loses its magnetic charge and is rendered inoperable.
detection controls
A security mechanism that helps to discover if a threat or vulnerability has entered into the computer system
implicit deny
The principle that establishes that everything that is not explicitly allowed is denied
protocol
Software that controls network communications using a set of rules
security control types
Security controls implementation:
- Technical: use technology
- Administrative: use administrative or management methods
- Physical: controls you can physically touch
Security control goals:
- Preventitive
- Detective
- Corrective
- Deterrent
- Compensating
transitive trust
A principle in which one entity implicitly trusts another entity because both of them trust the same third party
self-signed certificate
A type of digital certificate that is owned by the entity that signs it
defense in depth
A more comprehensive approach to layered security that also includes non-technical defenses like user training and physical protection
succession plan
A documented plan that ensures that all key business personnel have one or more designated backups who can perform critical functions when needed
cloud computing
A method of computing that involves real-time communication over large distributed networks to provide the resources software data and media needs of a user business or organization

sideloading
The practice of directly installing an app package on a mobile device instead of downloading it through an app store
disaster recovery
A major component of business continuity that focuses on repairing reconstructing restoring and replacing systems personnel and other
rollup
A collection of previously issued patches and hot fixes usually meant to be applied to one component of a system such as the web browser or a particular service
non-persistence
The property by which a computing environment is discarded once it has finished its assigned task
remote lockout
A security method of restricting access to sensitive data on a device without deleting it from memory
order of volatility
The order in which volatile data should be recovered from various storage locations and devices after a security incident occurs
detection
The act of determining if a user has tried to access unauthorized data or scanning the data and networks for any traces left by an intruder in any attack against the system.
scalability
the property by which a computing environment is able to gracefully fulfill its ever- increasing resource needs
grey hat
A hacker who exposes security flaws in applications and operating systems without consent but not ostensibly for malicious purposes
accountability
The process of determining who to hold responsible for a particular activity or event.
schema
A set of rules in a directory service for how objects are created and what the.r characteristics can be
heuristic monitoring
A network monitoring system that uses known best practices and characteristics in order to identify and fix issues within the network
secure boot
A UEFI feature that prevents unwanted processes from executing during the boot operation
non-repudiation
The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
credential manager
An application that stores passwords in an encrypted database for easy retrieval by the appropriate user
access control
The process of determining and assigning privileges to resources objects and data.
Faraday cage
A wire mesh container that blocks external electromagnetic fields from entering into the container
tunneling
A data-transport technique in which a data packet is encrypted and encapsulated in another data packet in order to conceal the info1mation of the packet inside
application container
A virtualization method where applications run in isolated containers on the host operating system instead of in separate VM’s
AKA application cell or container virtualization

waterfall model
A software development model where the phases of the SDLC cascade so that each phase will start only when all tasks identified in the previous phase are complete
guideline
Suggestions recommendations or best practices for how to meet a policy standard
tabletop exercise
A discussion-based session where disaster recovery team members discuss their roles in emergency situations as well as their responses to particular situations
protected distribution
A method of securing the physical cabling of a communications infrastructure
stored procedure
One of a set of pre-compiled database statements that can be used to validate input to a database
NIST 800 Series
Publications by the National Institute of Standards and Technology (NIST) that focus on computer security standards
accounting
The process of tracking and recording system activities and resource access.
change management
The process of approving and executing change in order to assure maximum security stability and availability of IT services.
scale up
The process of increasing the power of existing resources to achieve scale ability
version control
The practice of ensuring that the assets that make up a project are closely managed when it comes time to make changes
root of trust
Technology that enforces a hardware platform’s trusted computing architecture through encryption mechanisms designed to keep data confidential and to prevent tampering
incident report
A description of the events that occurred during a security incident
smart card
A device similar to a credit card that can store authentication information such as a user’s private key on an embedded microchip
distribution frame
A passive device which terminates cables allowing arbitrary interconnections to be made.
MAC filtering
The security technique of allowing or denying specific MAC addresses from connecting to a network device.
switch
A device that has multiple network ports and combines multiple physical network segments into a single logical network
smart device
An electronic device other than a typical computer that is connected to a network and has some computing properties
enciphering
The process of translating plain-text to cipher-text
M04
A hash algorithm based on RFC 1320 that produces a 128-bit hash value and is used in message integrity checks for data authentication
false positive
Something that is identified by a scanner or other assessment tool as being a vulnerability when in fact it is not
pointer dereference
A software vulnerability that can occur when the code attempts to remove the relationship between a pointer and the thing it points to (pointee). If the pointee is not properly established the dereferencing process may crash the application and corrupt memory
OpenlD
An identity federation method that enables users to be authenticated on cooperating websites by a third-party authentication service
network segmentation
The division of a large network into smaller logical networks
active-active
A redundancy mode used by load balancers to router traffic through primary (active) Load balancer is on standby in case of failure of the active device
directory traversal
An application attack that allows access to commands files and directories that may or may not be connected to the web document root directory
geolocation
The process of identifying the real-world geographic location of an object often by associating a location such as a street address with an IP address hardware address Wi-Fi positioning system GPS coordinates or some other form of information
information security
The protection of available information or information resources from unauthorized access attack theft or data damage
failover
A technique that ensures a redundant component device or application can quickly and efficiently take over the functionality of an asset that has failed

active directory
the standards-based directory service from Microsoft that runs on Microsoft Windows servers.
pop-up blocker
Software that prevents pop-ups from sites that are unknown or untrusted and prevents the transfer of unwanted code to the local system
gain
The reliable connection range and power of a wireless signal measured in decibels
sniffer
A device or program that monitors network communications on the network wire or across a wireless network and captures data
active-passive
A redundancy mode used by load balancers to route traffic equally through two load balancers. balancers to route traffic through a primary (active) load balancer while the other (passive) load balancer is on standby in case of failure of the active Device
chain of custody
The record of evidence history from collection to presentation in court to disposal.
geofencing
The practice of creating a virtual boundary based on real-world geography
risk register
The record of risk information as represented in tables or graphs
management controls
Procedures implemented to monitor the adllerence to organizational security policies
integrity
The fundamental security goal of keeping organizational information accurate free of errors and without unauthorized modifications
infrastructure as code (IaC)
The process of managing and provisioning computer data centers through machine-readable definition files rather than physical hardware configuration or interactive configuration tools.
port
An endpoint of a logical connection that host computers use to connect to processes or services on other hosts
local shared object (LSO)
Commonly called a Flash cookie (due to its similarity with an HTTP cookie) is a piece of data that websites which use Adobe Flash may store on a user’s computer.
procedure
Step-by-step instructions that detail how to implement components of a policy
storage segmentation
The practice of compartmentalizing different types of data on one or more storage media such as isolating a mobile device’s OS and base apps from the apps and data added by the user
patch
A small unit of supplemental code meant to address either a security problem or a functionality flaw in a software package or operating system
IPv6
(IP version 6) An Internet standard that increases the available pool of IP addresses by implementing a 128-bit binary address space.
stealth scan
A type of port scan that identifies open ports without completing the three-way handshake
black box test
A penetration test where the tester is given no information about the system being tested.
data in transit
Information that primarily moves from medium to medium such as over a private network or the Internet
cookie
A piece of data-such as an authentication token that is sent by a website to a client and stored on the client’s computer
subdomain
In DNS a logical division of an organizational domain such as sales.develetech.com
IS0/IEC 27001
A standard model for information systems management practices created by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC)
ROT13
A simple substitution cipher that replaces a letter with the letter that is 13 letters after it in the alphabet
code review
An evaluation used to identify potential weaknesses in an application
damage controls
Security Measures implemented to prevent key assets from being damaged
ad hoc (wireless)
A decentralized connection mode used by wireless devices without relying on a pre-existing infrastructure, such as routers (wired networks) or access points (wireless networks).
live boot
The process of booting into an operating system that runs directly on RAM rather than being installed on a storage device
account management
Processes, functions, and policies used to effectively manage user accounts within an organization.
mantrap
A physical security control system that has a door at each end of a secure chamber
confidentiality
The fundamental security goal of keeping information and communications private and protected from unauthorized access
SSID broadcast
A continuous announcement by a WAP that transmits its name so that wireless devices can discover it
bitcoin
A decentralized encrypted electronic payment system that is used by legitimate entities and threat actors alike.
legal hold
A process designed to preserve all relevant information when litigation is reasonably expected to occur
vulnerability
Any condition that leaves an information system open to harm
incident response
The practice of using an organized methodology to address and manage security breaches and attacks while limiting danlige and reducing recovery costs
backout contingency plan
A documented plan that includes specific procedures and processes that are applied in the event that a change or modification made to a system must be undone
OSI model
A method of abstracting how different layers of a network structure interact with one another
cold site
A predetermined alternate location where a network can be rebuilt after a disaster
prevention controls
A security mechanism that helps to prevent a threat or attack from exposing a vulnerability in the computer system
false negative
Something that is identified by a scanner or other assessment tool as not being a vulnerability when in fact it is
screen filter
An object attached to a screen that conceals the contents of the screen from certain viewing angles
multi-factor authentication
An authentication scheme that requires validation of at least two distinct authentication factors
refactoring
The process of restructuring application code to improve its design without affecting the external behavior of the application or to enable it to handle particular situations
staging
The process of setting up an environment through which an asset can be quickly and easily deployed for testing purposes
hot and cold aisle
A method used within data centers and computer rooms to control the temperature and humidity by directing the flow of hot and cold air

scale out
The process of adding more resources in parallel with existing resources to achieve scale ability
system of records
A collection of information that uses an individual’s name or an identifying number symbol or other identification Scheme
context aware authentication
Authentication method using multiple elements to authenticate a user and a mobile device. It can include:
- Identity
- Geolocation
- Device type
runtime code
Source code that is interpreted by an intermediary run time environment that runs the code rather than the system executing the code directly
tethering
The process of sharing a wireless Internet connection with multiple devices
security policy
A formalized statement that defines how security will be implemented within a particular organization
risk analysis
The security process used for assessing risk damages that affect an organization
code signing
A form of digital signature that guarantees that source code and application binaries are authentic and have not been tampered wit
penetration test
A method of evaluating security by simulating an attack on a system
interference
In wireless networking the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals used by computing devices and other network devices
hypervisor
Software that creates, runs, and manages VM
2 types of hypervisors:
- Type I - runs directly on the hardware, aka bare bones virtualization
- Type II - runs as s/w within host OS
Several virtualization technologies exist:
- VMware pdts
- Microsoft Hyper-V pdts
- Oracle VM VirtualBox
full connect scan
A type of port scan that completes the three way handshake identifies open ports and collects information about network hosts by banner grabbing
OpenlD Direct
An authentication layer that sits on top of the OAuth 2.0 authorization protocol
risk management
The process of identifying risks analyzing iliem developing a response strategy for them and mitigating their future impact
slashdot effect
A sudden temporary surge in traffic to a website that occurs when another website or other source posts a story that refers visitors to the victim website
SORN
A federally mandated publication of any system of record in the Federal Register
decryption
A cryptographic technique that converts ciphertext back to plaintext
operational controls
Security measures implemented to safeguard all aspects of day-to-day operations functions and activities
wildcard certificate
A type of digital certificate that enables organizations to configure a certificate’s scope to encompass multiple subdomains
round robin
A scheduling approach used by load balancers to route traffic to devices one by one according to a list
job rotation
A concept that states that personnel -should rotate between job roles to prevent abuses of power reduce boredom and improve professional skills
site survey
The collection of information on a location for the purposes of building the most ideal infrastructure
secure POP
A version of the Post Office Protocol that uses SSL or TLS to provide secure communications between a mail client and the mail server
network mapper
A device or program that can identify the logical topology of a network to reveal its connection pathways
order of restoration
A concept that dictates what types of systems to prioritize in disaster recovery efforts
security architecture review
An evaluation of an organization’s current security infrastructure model and security measures
remote wipe
A security method used to remove and permanently delete sensitive data from a mobile device when it is not in the authorized user’s physical possession
subnetting
The division of a large network into smaller logical networks
vulnerability assessment
A security assessment that evaluates a system’s security and its ability to meet compliance requirements based on the configuration state of the system
IV attack
A wireless attack where the attacker is able to predict or control the IV of an encryption process thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user or network
extranet
A private network that provides some access to outside parties particularly vendors partners and select customers
host-based firewall
Software that is installed on a single system to specifically guard against networking attacks
remote attestation
An authentication process that enables a host to verify its hardware and software configuration to a remote host such as a server
personnel management
The practice of ensuring that all of an organization’s personnel whether internal or external ace complying with policy
full backup
A backup type in which all selected filesregardless of prior state are backed up
deduplication
A technique for removing duplicate copies of repeated data. In SIEM the removal of redundant information provided by several monitored systems
network operating system
Software that controls network traffic and access to network resources
computer forensics
The practice of collecting and analyzing data from storage devices computer systems networks and wireless communications and presenting the information as a form of evidence in the court of law
infrared transmission
A form of wireless transmission in which signals are sent as pulses of infrared light
service pack
A collection of system updates that can include functionality enhancements new features and typically all patches updates and hot fixes issued up to the point of the release of the service pack
scanning
The phase of the hacking process in which the attacker uses specific tools to determine organization’s infrastructure and discover vulnerabilities
data disposal
The practice of thoroughly eliminating data from storage media so that it cannot be recovered.
spam filter
A program that will detect specific words that are commonly used in spam messages
IPv4
(IP version 4) An Internet standard that uses a 32-bit number assigned to a computer on a TCP /IP network
S-box
A relatively complex key algorithm that when given the key provides a substitution key in its place
checkpoint
The state of a virtual machine at a specific point in time.
standard operating procedure
A collection of procedures that dictate how policy components are implemented
redundancy
The property by which a computing environment keeps one or more sets of additional resources in addition to the primary set of resources
compiled code
Code that is converted from high-level programming language source code into a lower level code that can then be directly executed by the system.
risk
An information security concept that indicates exposure to the chance of damage or loss and signifies the likelihood of a hazard or dangerous threat
mandatory vacation
A concept that states that personnel should be required to go on vacation for a period of time so their activities can be reviewed