IT Security Terms

Spoofing

r

AN attack carried out using a trick, disguise , deceit or by falsifying data

Router

r

Router: Device that transfers(routers)packets between two or more networks

IDS

r

IDS: A defense tool used to monitor network traffic(packets) and provide alerts when there is suspicious traffic, or to quarntine suspicious traffic

Malware

r

Malicious software, such as a virus, worm, or Trojan horse

Authenitication

r

Method( Usually based on Username and password) by which an IS validates or verifies that a user is really who he or she claims to be.

End Point Security

r

Security measuers to protect the end points, such as desktops and laptops, in the enterprise by analyzing data packets enetring or exiting it

Zombie

r

an infected computer that is controlled remotely via the internet by an unauthrized user, such as a spammer, fraduster, or hacker

Preimiter Security

r

security measures to ensure that onlu authorized users gain acess to the network

Plaintext or Cleartext

r

Plaintext or clear-text; readable text

Exposure

r

Exposure: The estimated cost, loss, or damage that can result if a threat exploits a vulnerablitity

Spewar botnet

r

Bot Network a network of hijacked computers that are controlled remotely- typically to launch spam or spyware. Also called software rebots. Bot Networks are lined to a range of malicious activity.

Threat

r

Something or someone that may result in harm to an asset.

Vulnerability

r

weaknesses that threatnes the confidentiality, integrity or availibality of an asset.

Packet

r

Packet is a unit of data for transmission over a network with a header containing the source and destination of the packet

Securing the Enterprise and Business Continuity

Fault tolerance

r

the ability of an IS to continue to poerate when a failure occurs, but usually for a limited time or at a reduced level.

Ciphertext

r

ciphertext is encrypted text

Firewall

r

a method (hardware and software) of guarding a private network from a public network (internet) by analyzing data packets eneting or exiting it.

Dos or DDOs

r

security measures to ensure that onlu authorized users gain acess to the network

Back up

r

Backup: a duplicate copu of data or programs kept in a secured location

Countermeasure

r

Countermeasure: safeguard implemented to mitigate (lessen) risk.

Data and Enterprise Securty Incidents

r

1. what kind of business was choicepoint in ?2. provide a brief summary of what happen ?3. describe the impact on choicepoints stock price.4. search the web what eventually happen to choice point Infosec was viewed as cost rather than as resource for preventing business disruptions and satisfying goverance responsibilities. controlling physical and remot access to proprietary sestems and information continous to present IT security challenges. A vast majorty of data breaches involvle some sort of insider error or action etheir intentional or unententional.

Risk

r

Probability of a threat exploiting a vulnerability.

CIA traid(confedentiality, integrity, availability)

r

The three main preciples of IT.

Main topic

r

Process of identifing, assesing