a Edriss ali 12 éve
204
Még több ilyen
Process of identifing, assesing
The three main preciples of IT.
Probability of a threat exploiting a vulnerability.
1. what kind of business was choicepoint in ?
2. provide a brief summary of what happen ?
3. describe the impact on choicepoints stock price.
4. search the web what eventually happen to choice point
Infosec was viewed as cost rather than as resource for preventing business disruptions and satisfying goverance responsibilities. controlling physical and remot access to proprietary sestems and information continous to present IT security challenges. A vast majorty of data breaches involvle some sort of insider error or action etheir intentional or unententional.
Countermeasure: safeguard implemented to mitigate (lessen) risk.
Backup: a duplicate copu of data or programs kept in a secured location
a method (hardware and software) of guarding a private network from a public network (internet) by analyzing data packets eneting or exiting it.
ciphertext is encrypted text
the ability of an IS to continue to poerate when a failure occurs, but usually for a limited time or at a reduced level.
Packet is a unit of data for transmission over a network with a header containing the source and destination of the packet
weaknesses that threatnes the confidentiality, integrity or availibality of an asset.
Something or someone that may result in harm to an asset.
Bot Network a network of hijacked computers that are controlled remotely- typically to launch spam or spyware. Also called software rebots. Bot Networks are lined to a range of malicious activity.
Exposure: The estimated cost, loss, or damage that can result if a threat exploits a vulnerablitity
Plaintext or clear-text; readable text
security measures to ensure that onlu authorized users gain acess to the network
an infected computer that is controlled remotely via the internet by an unauthrized user, such as a spammer, fraduster, or hacker
Security measuers to protect the end points, such as desktops and laptops, in the enterprise by analyzing data packets enetring or exiting it
Method( Usually based on Username and password) by which an IS validates or verifies that a user is really who he or she claims to be.
Malicious software, such as a virus, worm, or Trojan horse
IDS: A defense tool used to monitor network traffic(packets) and provide alerts when there is suspicious traffic, or to quarntine suspicious traffic
Router: Device that transfers(routers)packets between two or more networks
AN attack carried out using a trick, disguise , deceit or by falsifying data