Securing The Enterprice and Business Continuity

IT Security Terms

Threat

r

Threat: someone or something that may result in harm to an asset.

Risk

r

Risk: probability of a threat exploiting a vulnerability

CIA triad(Confidentiality, integrity, availability

r

The three main principles of IT Security

Risk Management

Risk Management

r

Risk Management: Process of identifying,assessing, and redusing risks to an acceptable level.

Expsure

r

Exposure: The estimated cost, loss, or damage that can result if a threat exploits a vulnerablitity

Exploit

r

Exploit: A tool or technique that takes advantage of a vulnerability

Acess Control

Acess Control

r

Access Control: Security feature designed to restric who has access to a network, IS, or data. Access to resources on a computer is restricted using a logical or physical control desinged to protect against unauthorized entry or use.

Vulnerability

Vulnerability

r

Vulnerability: weakness that threatens the confdentiality, integrity, or availability of an asset

Countermeasure

r

Countermeasure: safeguard implemented to mitigate (lessen) risk.

Audit

Audit

r

The process of generating, recording, and reviewing a chronological record of systems events to ascertain their accuracy.

Encryption

Encryption

r

Transforing data into scrambled code to protect it from being understood by unauthorized users

Plaintext or clear-text

r

Plaintext or clear-text; readable text

Ciphertext

r

ciphertext is encrypted text

a

Authentication

r

Method( Usually based on Username and password) by which an IS validates or verifies that a user is really who he or she claims to be.

Malware

r

Malicious software, such as a virus, worm, or Trojan horse

Biometrics

Biometrics

r

Methods to identify a person based on a biological feature, such as a fingerprint.

Perimeter security

r

security measures to ensure that onlu authorized users gain acess to the network

EndPoint Security

r

Security measuers to protect the end points, such as desktops and laptops, in the enterprise by analyzing data packets enetring or exiting it

firewall

r

a method (hardware and software) of guarding a private network from a public network (internet) by analyzing data packets eneting or exiting it.

Packet

r

Packet is a unit of data for transmission over a network with a header containing the source and destination of the packet

IP Address(Internet Protocol address)

IP Address(Internet Protocol address)

r

IP address: an address that uniquely identifies a specfific computer or other device on a network

a
Public key infrastructure (PKI)

Public key infrastructure (PKI)

r

PKI: a system to identify and authenticate the sender or receiver of an Internet message or transaction.

Router

r

Router: Device that transfers(routers)packets between two or more networks

Intrusion detection system(IDS)

r

IDS: A defense tool used to monitor network traffic(packets) and provide alerts when there is suspicious traffic, or to quarntine suspicious traffic

Fault tolerance

r

the ability of an IS to continue to poerate when a failure occurs, but usually for a limited time or at a reduced level.

Backup

r

Backup: a duplicate copu of data or programs kept in a secured location

Spoofing

r

AN attack carried out using a trick, disguise , deceit or by falsifying data

DOS or DDOS

r

AN ATTACK IN WHICH A SYSTEM IS BOMBARDED WITH SO MANY REQUESTS FOR SERCIE OR ACCESS THAT IT CRASHES OR CANNOT RESPOND.

Zombie

r

an infected computer that is controlled remotely via the internet by an unauthrized user, such as a spammer, fraduster, or hacker

Spyware Botnet

r

Bot Network a network of hijacked computers that are controlled remotely- typically to launch spam or spyware. Also called software rebots. Bot Networks are lined to a range of malicious activity.