click below
click below
Normal Size Small Size show me how
SecurityChap4Terms
Chap 4 terms
Term | Definition |
---|---|
Access list | a paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area |
Activity phase controls | Subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective |
admin controls | process for developing and ensuring that policies and procedures are carried out, specifying actions that users may do, must do, or cannot do |
alarm | an audible sound to warn a guard of an intruder |
antispyware | software that helps prevent computers from being infected by different types of spyware |
antivirus | software that can examin a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus |
barricade | a structure designed to block the passage of traffic |
Bayesian filtering | Spam filtering software that analyzes every word in an email and determines how frequently a word occurs in order to determine if it is spam |
Big data | a collection of data sets so large and complex that it becomes difficult to process using on hand database management tools or traditional data processing applications |
black list | permitting everything unless it appears on the list |
cable lock | a device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen |
client-side validation | having the client web browser perform all validations and error recovery procedures |
closed circuit television | video cameras and receivers used for surveillance in areas that require security monitoring |
compensating control | control that provides alternatives to normal controls that for some reason cannot be used |
corrective coontrol | control that is intended to mitigate or lessen the damage caused by an incident |
cross-site request forgery | attack that uses the user's web browser settings to impersonate the user |
data at-rest | data stored on electronic media |
data in-transit | data that is in transit across a network, such as an email sent across the internet |
data in-use | a state of data in which actions upon it are being performed by endpoint devices such as printers |
data loss prevention | a system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users |
deadbolt lock | a door lock that extends a solid metal bar into the door frame for extra security |
detective control | a control that is designed to identify any threat that has reached the system |
deterrent control | a control that attempts to discourage security violations before they occur |
embedded system | a computer system with a dedicated function within a larger electrical or mechanical system |
errors | faults in a program that occur while the application is running. also called exceptions |
exceptions | errors |
fencing | securing a restricted area by erecting a barrier |
firewall | hardware or software that is designed to prevent malicious packets from entering or leaving computers |
fuzz testing | a software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program |
guard | a human who is an active security element |
host-based application firewall | a firewall that runs a program on a local system |
hotfix | software that addresses a specific customer situation and often may not be distributed outside that customers organization |
input validation | verifying a user's input to an application |
lighting | lights that illuminate an area so it can be viewed after dark |
locking cabnit | a ruggedized steel box with a lock |
mainframe | a very large computing system that has a significant processing capabilities |
mantrap | a device that monitors and controls two interlocking doors to a small room designed to separate secure and non secure areas |
motion detection | determining an objects change in position in relation to its surrounding |
NoSQL | a non relational database that is better tuned for accessing large data sets |
NoSQL databases vs. SQL databases | an argument regarding which database technology is superior |
OS hardening | tightening security during the design and coding of the os |
packet filter | hardware or software that is designed to prevent malicious packets from entering or leaving computers |
patch | a general software security update intended to cover vulnerabilities that have been discovered |
popup blocker | either a program or a feature incorporated within a browser that stops popup advertisements fromappearing |
preventative controls | control that attempts to prevent the threat from coming in and reaching contact with the vulnerability |
PDS | a system of cable conduits that is used to protect classified info being transmitted between 2 secure areas |
proximity reader | a device that detects an emitted signal in order to identify the owner |
safe | a ruggedized steel box with a lock |
SCADA | large-scale, industrial-control systems. |
security control | any device or process that is used to reduce risk |
security policy | a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep info secure |
server side validation | having a server perform all validations and error recovery procedures |
service pack | software that is a cumulative package of all security updates plus additional features |
sign | a written placard that explains a warning, such as notice that an area is restricted |
smartphone | a call phone with an operating system that allows it to run third-party apps |
SQL vs NoSQL | an argument regarding which database technology is better |
static environment | devices in which additional hardware cannot easily be added or attached |
technical controls | security controls that are carried out or managed by devices |
trusted os | an OS that has been designed through OS hardening |
video surveillance | monitoring activity that is captured by a video camera |
whitelist | permitting nothing unless it appears on the list |
wrapper function | a substitute for a regular function that is used in testing |