IT Security Terms
Spoofing
AN attack carried out using a trick, disguise , deceit or by falsifying data
Router
Router: Device that transfers(routers)packets between two or more networks
IDS
IDS: A defense tool used to monitor network traffic(packets) and provide alerts when there is suspicious traffic, or to quarntine suspicious traffic
Malware
Malicious software, such as a virus, worm, or Trojan horse
Authenitication
Method( Usually based on Username and password) by which an IS validates or verifies that a user is really who he or she claims to be.
End Point Security
Security measuers to protect the end points, such as desktops and laptops, in the enterprise by analyzing data packets enetring or exiting it
Zombie
an infected computer that is controlled remotely via the internet by an unauthrized user, such as a spammer, fraduster, or hacker
Preimiter Security
security measures to ensure that onlu authorized users gain acess to the network
Plaintext or Cleartext
Plaintext or clear-text; readable text
Exposure
Exposure: The estimated cost, loss, or damage that can result if a threat exploits a vulnerablitity
Spewar botnet
Bot Network a network of hijacked computers that are controlled remotely- typically to launch spam or spyware. Also called software rebots. Bot Networks are lined to a range of malicious activity.
Threat
Something or someone that may result in harm to an asset.
Vulnerability
weaknesses that threatnes the confidentiality, integrity or availibality of an asset.
Packet
Packet is a unit of data for transmission over a network with a header containing the source and destination of the packet
Securing the Enterprise and Business Continuity
Fault tolerance
the ability of an IS to continue to poerate when a failure occurs, but usually for a limited time or at a reduced level.
Ciphertext
ciphertext is encrypted text
Firewall
a method (hardware and software) of guarding a private network from a public network (internet) by analyzing data packets eneting or exiting it.
Dos or DDOs
security measures to ensure that onlu authorized users gain acess to the network
Back up
Backup: a duplicate copu of data or programs kept in a secured location
Countermeasure
Countermeasure: safeguard implemented to mitigate (lessen) risk.
Data and Enterprise Securty Incidents
1. what kind of business was choicepoint in ?2. provide a brief summary of what happen ?3. describe the impact on choicepoints stock price.4. search the web what eventually happen to choice point Infosec was viewed as cost rather than as resource for preventing business disruptions and satisfying goverance responsibilities. controlling physical and remot access to proprietary sestems and information continous to present IT security challenges. A vast majorty of data breaches involvle some sort of insider error or action etheir intentional or unententional.
Risk
Probability of a threat exploiting a vulnerability.
CIA traid(confedentiality, integrity, availability)
The three main preciples of IT.
Main topic
Process of identifing, assesing