Kategóriák: Minden - security - router - malware - encryption

a Edriss ali 12 éve

204

Business Cheack points

Information Technology security encompasses various aspects to protect assets and data. Fault tolerance ensures systems continue to operate during failures, albeit at reduced capacity.

Business Cheack points

IT Security Terms

Main topic

Process of identifing, assesing

CIA traid(confedentiality, integrity, availability)

The three main preciples of IT.

Risk

Probability of a threat exploiting a vulnerability.

Data and Enterprise Securty Incidents

1. what kind of business was choicepoint in ?

2. provide a brief summary of what happen ?

3. describe the impact on choicepoints stock price.

4. search the web what eventually happen to choice point

Infosec was viewed as cost rather than as resource for preventing business disruptions and satisfying goverance responsibilities. controlling physical and remot access to proprietary sestems and information continous to present IT security challenges. A vast majorty of data breaches involvle some sort of insider error or action etheir intentional or unententional.

Countermeasure

Countermeasure: safeguard implemented to mitigate (lessen) risk.

Back up

Backup: a duplicate copu of data or programs kept in a secured location

Dos or DDOs

Firewall

a method (hardware and software) of guarding a private network from a public network (internet) by analyzing data packets eneting or exiting it.

Ciphertext

ciphertext is encrypted text

Fault tolerance

the ability of an IS to continue to poerate when a failure occurs, but usually for a limited time or at a reduced level.

Securing the Enterprise and Business Continuity

Packet

Packet is a unit of data for transmission over a network with a header containing the source and destination of the packet

Vulnerability

weaknesses that threatnes the confidentiality, integrity or availibality of an asset.

Threat

Something or someone that may result in harm to an asset.

Spewar botnet

Bot Network a network of hijacked computers that are controlled remotely- typically to launch spam or spyware. Also called software rebots. Bot Networks are lined to a range of malicious activity.

Exposure

Exposure: The estimated cost, loss, or damage that can result if a threat exploits a vulnerablitity

Plaintext or Cleartext

Plaintext or clear-text; readable text

Preimiter Security

security measures to ensure that onlu authorized users gain acess to the network

Zombie

an infected computer that is controlled remotely via the internet by an unauthrized user, such as a spammer, fraduster, or hacker

End Point Security

Security measuers to protect the end points, such as desktops and laptops, in the enterprise by analyzing data packets enetring or exiting it

Authenitication

Method( Usually based on Username and password) by which an IS validates or verifies that a user is really who he or she claims to be.

Malware

Malicious software, such as a virus, worm, or Trojan horse

IDS

IDS: A defense tool used to monitor network traffic(packets) and provide alerts when there is suspicious traffic, or to quarntine suspicious traffic

Router

Router: Device that transfers(routers)packets between two or more networks

Spoofing

AN attack carried out using a trick, disguise , deceit or by falsifying data