MIDTERMS - IAS - PART 2

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

Security Policy

A document describing a company's security controls and activities, outlining the protection of physical and information assets.

2
New cards

Policy Makers

Individuals or groups involved in creating security policies, including the board, IT team, legal team, and HR team.

3
New cards

Policy Audience

All senior management, employees, stockholders, consultants, and service providers who interact with company assets.

4
New cards

Policy Classification

Security policies are categorized as physical security, personnel management, and hardware/software controls.

5
New cards

Physical Security

Policies safeguarding physical assets through measures like surveillance, entry control, and alarms.

6
New cards

Personnel Management

Guidelines for employees to ensure secure handling of passwords and confidential information.

7
New cards

Hardware and Software

Policies specifying the technology and configuration used by system and network administrators.

8
New cards

Policy Audit

The process of comparing security policies with actual practices to identify internal and external vulnerabilities.

9
New cards

Policy Enforcement

Ensuring compliance with security policies to prevent accidental or deliberate violations.

10
New cards

Policy Awareness

Educating employees on security policies through regular training to reduce the risk of information leakage.

11
New cards

Privileged Password Management

A process to protect sensitive data by limiting access to specific individuals.

12
New cards

Network Administrator Daily Tasks

A checklist of essential daily duties for network administrators to maintain system security.

13
New cards

Network Security Audit Checklist

A comprehensive audit covering hardware, software, and human processes to identify risks.

14
New cards

Firewall Audit Checklist

A thorough review of firewall configurations and rules, ensuring all changes are documented.

15
New cards

Virtual Private Network (VPN) Configuration

Setting up remote access for employees while ensuring proper documentation and security.

16
New cards

Apache Server Setup

Guidelines for configuring the Apache server using various command methods.

17
New cards

E-mail Server Security

Protecting email systems from phishing and malicious attacks through technical and professional measures.

18
New cards

Penetration Testing

Simulating cyberattacks to identify vulnerabilities and assess potential system damage.

19
New cards

Network Compliance

Ensuring systems meet regulatory standards through monitoring, auditing, and maintaining documentation.

20
New cards

Cryptography

The science of secret writing, ensuring secure communication and data protection.

21
New cards

Symmetric Key Cryptography

Encryption method using a single secret key for both encryption and decryption.

22
New cards

Asymmetric Key Cryptography

Also called public-key cryptography, using separate public and private keys for encryption and decryption.

23
New cards

Hashing

Transforming plaintext into a fixed-size hash value to ensure data integrity.

24
New cards

Cryptanalysis

The study and practice of breaking cryptosystems and analyzing ciphers to discover vulnerabilities.

25
New cards

Classical Attack

Cryptanalysis methods using mathematical analysis and brute-force approaches to break encryption.

26
New cards

Social Engineering Attack

Manipulating people into revealing confidential information or granting unauthorized access.

27
New cards

Implementation Attack

Using side-channel analysis to exploit weaknesses when physical access to a system is available.