System Network and Defense

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

Physical Security

Fencing and Physical Barriers, Biometrics, Badges and Access Logs, Surveillance

2
New cards

Fencing and Physical Barriers

They are the outermost layer of defense and the most visible. All physical barriers should meet specific design requirements and material specifications

3
New cards

Fence

is barrier that encloses secure areas and designated boundaries.

4
New cards

Biometrics

physiological or behavioral characteristics of an individual, and there are security practices based on identifying and granting access using biometrics.

5
New cards

Type I (False Rejection)

error rejects a person that registers and is an authorized user. It means that someone who should gain access is not granted access

6
New cards

Type II (False acceptance )

errors allow entry to people who should not have entry, meaning a cybercriminal can potentially gain access

7
New cards

Badges and Access Logs

Allows an individual to gain access to an area with automated entry points

8
New cards

Surveillance

Many physical access controls, including deterrent and detection systems, ultimately rely on people to intervene and stop the actual attack or intrusion.

9
New cards

Developing and Testing, Staging environments and production, provisioning and deprovisioning

Stages of Application Development

10
New cards

Developing and testing

Software is developed and updated in a development environment, where it can be developed, tested and debugged before being deployed.

11
New cards

Staging environments and Production

By testing in a staging environment, developers can verify that the software runs under the required security settings before deploying to production

12
New cards

Provisioning and Deprovisioning

Provisioning is the creation or updating of software. Deprovisioning is its removal

13
New cards

Code Signing

helps prove that a piece of software is authentic. Executables designed to install and run on a device are digitally signed to validate the author

14
New cards

Secure Cookies

When your client interacts with a server, it sends an HTTP/S response that instructs a browser create 1 cookie which can be use for future request Using secure cookies with HTTPS instead of HTTP to to ensure encryption which protects the information stored on it

15
New cards

Unauthorized access to data centers, computer rooms and wiring closets

Implement policies, standards and procedures for staff and visitors to ensure the facilities are secure

16
New cards

Server and system downtime

Develop a business continuity plan for critical applications to maintain availability of operations
Develop a disaster recovery plan for critical applications and data

17
New cards

Network operating system software vulnerability

Develop a policy to address application software and operating system updates.

Install patches and updates regularly

18
New cards

Unauthorized access to systems

Use multi-factor authentication

Monitor log files

19
New cards

Data loss

Implement data classification standards

implement backup procedures

20
New cards

Software development vulnerabilities

conduct software testing prior to launch

21
New cards

Secure Shell (SSH)

is a protocol that provides a secure (encrypted) remote connection to a device. It is more secure due to strong encryption rather than Telnet

22
New cards

Secure copy (SCP)

securely transfers files between two remote systems. uses SSH for data transfer and authentication, ensuring the authenticity and confidentiality of the data in transit.

23
New cards

VLAN

provide a way to group devices within a local area network (LAN) and on individual switches.

24
New cards

Zero-Trust

is an evolving design approach which recognizes that even the most robust access control systems have their weakness

25
New cards

Demilitarized Zone (DMZ)

host systems that are accessible through the firewall are physically separated from the internal network by means of secured switches or by using an additional firewall to control traffic between the web server and the internal network

26
New cards

Application management

allows you to digitally sign applications so that you can authorize which applications users can install. This helps to ensure that installed applications come from a trusted source.

27
New cards

3 principles of high availability

Eliminating Single Points of Failure, Providing for reliable crossover, Detecting failures as they Occur