Information Assurance System Midterms

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/56

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

57 Terms

1
New cards

Domain

It refers to any group of users, workstations, devices, printers, computers, and database servers that share different types of data via network resources.

2
New cards

Domain

It is used to manage all user functions, including username, password, and shared system resource authentication and access. It is also used to assign specific resource privileges, such as user accounts.

3
New cards

User Domain

This covers all the users that have access to the other domains.

4
New cards

Workstation Domain

It is a computer of an individual user where the production takes places.

5
New cards

LAN Domain

This contains all of the workstation, hubs, switches and routers. This is also a trusted zone.

6
New cards

WAN Domain

It consists of the Internet and semi-private lines.

7
New cards

LAN/WAN Domain

It is the boundary between the trusted and untrusted zones. The zones are filtered with a firewall.

8
New cards

System/Application Storage Domain

This domain is made up of user-accessed servers such as e-mail and database.

9
New cards

Remote Access Domain

This is the domain in which a mobile user can access the local network usually through a VPN.

10
New cards

Local Area Network

This domain is defined as a sub-network that is made up of servers and clients, each of which is controlled by a centralized database.

11
New cards

Wide Area Network

It is a communications network that spans a large geographic area such as cities, states, or countries.

12
New cards

Remote Access Domain

This enables remote users to access files and other system resources on any devices or servers that are connected to the network at any time, increasing employee productivity and enabling them to better collaborate with colleagues around the world.

13
New cards

IP security VPN

It is a common remote access technology in use today is the IPsec VPN.

14
New cards

Secure Socket Layer VPN

It is a common encryption technology that is widely used to provide secure communication on the Internet.

15
New cards

Microsoft DirectAccess

It is relatively new player to the remote access arena that was not developed by a firewall manufacturer, but rather by Microsoft.

16
New cards

System/Application Domain

This consists of all of a business’ mission-critical systems, applications, and data.

17
New cards

Unauthorized Physical Access

This can be defined as “gaining access to a physical entity or area without permission from an administrative figure.“

18
New cards

Unauthorized Logical Access

This is nearly identical to unauthorized physical access, except it is not limited to tangible data.

19
New cards

Software Vulnerabilities

This is a flaw that exists in the programming of a software component or system that allows a malicious attacker to gain unauthorized access to that system through an exploit.

20
New cards

Server Vulnerabilities

It is similar to software vulnerabilities on non-server systems with the exception that software vulnerabilities that can exist on servers have the potential to be even more damaging.

21
New cards

Data Loss

It occurs when any stored data is destroyed.

22
New cards

Cyber Ethics

It refers to the code of responsible behavior on the Internet.

23
New cards

Security Policy

It is the statement of responsible decision makers about the protection mechanism of a company’s crucial, physical, and information assets.

24
New cards

Policy Makers

Security policy development is a joint or collective operation of all entity of an organization that is affected by its rules.

25
New cards

Board

Company board members must render their advice to some form of a review of policies in response to the exceptional or abominable running condition of the business.

26
New cards

IT Team

The members of this team usually are the biggest consumers of the policy information in any company because they develop standards around the usage of the computer system, especially security controls.

27
New cards

Legal Team

This team ensures the legal points in the document and guides a particular point of appropriateness in the company.

28
New cards

HR Team

This team typically obtains a certified certificate from each employee, in which they have read and understood the stipulated policy, as it deals with reward- and punishment-related issues of employees to implement discipline.

29
New cards

Policy Audience

Security policy applies to all senior management, employees, stockholders, consultants, and service providers who use company assets.

30
New cards

Policy Classification

Every organization typically has three (3) policies: first, it is drafted on paper; second, that is in employees’ minds; and third that it is implemented.

31
New cards

Physical Security

It mandates what protection should be wielded to safeguard the physical asset from both employees and management and applies to the prevail facilities, including doors entry point, surveillance, and alarm.

32
New cards

Hardware and Software

It directs the administrator what type of technology to use and how network control should be configured and applied to the system and network administrators.

33
New cards

Policy Audit

Security documents are living documents.

34
New cards

Policy Enforcement

Enforcement of security policies ensures compliance with the principle and practices dictated by the company because policy procedure does not work if they are violated.

35
New cards

Policy Awareness

Company employees are often perceived as a “soft” target to be compromised because they are the least predictable and easiest to exploit.

36
New cards

Privileged Password Management

This process seeks to protect the most sensitive data.

37
New cards

Network Administrator Daily Tasks

This checklist aims to list a series of key daily tasks performed by network administrators and provide space for those tasks to be recorded.

38
New cards

Network Security Audit Checklist

The network security audit checklist deals with hardware and software, training, and procedures.

39
New cards

Firewall Audit Checklist

This process is thorough and covers a series of precautions.

40
New cards

Virtual Private Network Configuration

In this process, a VPN is set up on a staff member’s laptop, which allows the staff member to connect to the office network remotely.

41
New cards

Apache Server Setup

The most popular server in the world is Apache

42
New cards

Penetration Testing

This involves testing systems security by trying to break into it

43
New cards

Network Compliance

This management enables the identification and correction of trends that could lead to business problems such as network instability and service interruption.

44
New cards

Cyptography

It is the science of secret writing to keep the data secret and an important aspect when dealing with network security.

45
New cards

Symmetric Key Cryptography

It involves usage of one (1) secret key along with encryption and decryption algorithms which help in securing the contents of the messages.

46
New cards

Asymmetric Key Cryptography

Also known as “public key cryptography,” it involves the usage of a public key along with the secret key.

47
New cards

Hashing

It involves taking the plain-text and converting it to a hash value of fixed size by a hash function.

48
New cards

Cryptanalysis

It is the study of cipher text, ciphers, and cryptosystems to understand how they work as well as find and improve techniques for defeating or weakening threats.

49
New cards

Classical Attack

It can be divided into mathematical analysis and brute force attacks.

50
New cards

Social Engineering Attacks

It is something dependent on the human factor. Tricking someone into revealing their passwords to the attacker or allowing access to the restricted area comes under this attack. People should be cautious when revealing their passwords to any third party that is not trusted.

51
New cards

Implementation Attacks

A side-channel analysis can be used to obtain a secret key for this kind of attack.

52
New cards

Caesar Cipher

It is one of the earliest known and simplest ciphers. It is a type of substitution cipher in which each letter in the plaintext is shifted to a certain number places down the alphabet.

53
New cards

Keyword Cipher

To use this method for constructing the ciphertext alphabet, pick a keyword and write it down while ignoring the repeated letters.

54
New cards

Giovanni’s Method

Around 1580, Giovanni Battista Argenti suggested one can also pick a key letter and begin the keyword UNDER the letter of the plaintext.

55
New cards

Transposition Techniques

A cipher that is archived by performing some permutation on the plaintext letters. The simplest such cipher is the rail fence technique, in which the plaintext is written down as a sequence of diagonals and then read off as a sequence of rows.

56
New cards

Polyalphabetic Cipher

Another way to improve on the simple monoalphabetic techniques is to use different monoalphabetic substitutions as on proceeds through the plaintext message. The best-known and the simplest algorithm is referred to as the Vigenere Cipher.

57
New cards

E-mail Server Security

It is one of the first ways anyone is going to try to get into a company. Fighting off phishing attacks and other malicious attempts to compromise security relies on both strong technical resilience and a high level of professional training.