Email Security & Monitoring Data (sec +)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Mail Gateway

a specialized server that sits between an organization's internal email system and the external network (the internet) and processes all incoming and outgoing email

2
New cards

Sender Policy Framework (SPF)

a DNS text record that lists the IP addresses of all authorized mail servers permitted to send email on behalf of a specific domain, helping to prevent email spoofing and phishing

3
New cards

DomainKeys Identified Mail (DKIM)

an email authentication technique that uses public-key cryptography to digitally sign outgoing emails with a private key

4
New cards

Domain-based Message Authentication, Reporting, and Conformance (DMARC)

an email authentication protocol that builds on SPF and DKIM to provide senders with a way to specify policy on how receiving servers should handle emails that fail authentication, and offers reporting on authentication results

5
New cards

File Integrity Monitoring (FIM)

a security process that monitors and validates the state of operating system and application files to detect unauthorized changes

6
New cards

System File Checker (SFC)

a command-line utility that scans and verifies the integrity of protected system files and, if a file is found to be corrupt or modified, it will replace it with a cached copy from a compressed folder

7
New cards

Linux Tripwire

creates a baseline database of cryptographic hashes for critical system files and directories, and then alerts administrators whenever unauthorized or unexpected changes occur to those files

8
New cards

Data Loss Prevention (DLP)

a set of tools and processes designed to prevent sensitive information from leaving a corporate network or endpoint via unauthorized channels

9
New cards

Data in Use

the state of data that is actively being created, retrieved, updated, or processed by a computer system's CPU and memory (RAM)

10
New cards

Data in Motion

the state of data that is actively being transferred or communicated over a network connection, such as the internet, a corporate LAN, or a wireless link

11
New cards

Data at Rest

12
New cards

USB Blocking

a security measure that restricts or completely prevents the use of USB storage devices on endpoints to mitigate the risk of data theft (DLP)

Explore top flashcards

Bio test 2
Updated 56d ago
flashcards Flashcards (55)
unit 4 outcome 1b
Updated 877d ago
flashcards Flashcards (47)
Psychology Exam- 2
Updated 995d ago
flashcards Flashcards (95)
Equilibrium
Updated 982d ago
flashcards Flashcards (27)
E - 10
Updated 672d ago
flashcards Flashcards (20)
Bio test 2
Updated 56d ago
flashcards Flashcards (55)
unit 4 outcome 1b
Updated 877d ago
flashcards Flashcards (47)
Psychology Exam- 2
Updated 995d ago
flashcards Flashcards (95)
Equilibrium
Updated 982d ago
flashcards Flashcards (27)
E - 10
Updated 672d ago
flashcards Flashcards (20)