Create
Learn
Share

Domain 7 Security Operations

rename
klct555's version from 2017-06-12 04:20

Domain 7 Security Operations

Question Answer
Acoustic SensorsDevice that uses passive listening devices
Administrator accountsAccounts that are assigned only to named individuals that require administrative access to the system to perform maintenance activities, and should be different and separate from a user’s normal account.
Balanced Magnetic Switch (BMS)Devices that use magnetic field or mechanical contact to determine if an alarm signal is initiated.
Chain of custodyThe who, what, when, and how the evidence was handled - from its identification through its entire life cycle, which ends with destruction, permanent archiving, or returning to owner.
Cipher LockA lock controlled by touch screen, typically 5 to 10 digits that when pushed in the right combination the lock will releases and allow entry.
Configuration management (CM)A discipline for evaluating, coordinating, approving or disapproving, and implementing changes in artifacts that are used to construct and maintain software systems.
Data Leak Prevention (DLP)A suite of technologies aimed at stemming the loss of sensitive information that occurs in the enterprise.
Egress filteringThe practice of monitoring and potentially restricting the flow of information outbound from one network to another.
Infrared Linear Beam SensorsA focused infrared (IR) light beam is projected from an emitter and bounced off of a reflector that is placed at the other isre of the detection area.
Instant KeysProvide a quick way to disable a key by permitting one turn of the master key to change a lock.
Intrusion Detection System (IDS)A technology that alerts organizations to adverse or unwanted activity.
IndemnificationThe party to party litigation costs resulting from its breach of warranties.
Intrusion Prevention System (IPS)A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity.
HoneypotDecoy servers or systems setup to gather information regarding an attacker or intruder into your system.
HoneyfarmA centralized collection of honeypots and analysis tools.
HoneynetTwo or more honeypots on a network.
Live evidenceData that are dynamic and exist in running processes or other volatile locations (e.g., system/device RAM) that disappear in a relatively short time one the system is powered down.
Locard’s exchange principleStates that when a crime is committed, the perpetrators leave something behind and take something with them, hence the exchange.
Magnetic Stripe (mag strip) cardsConsist of a magnetically sensitive strip fused onto the surface of a PVC material, like a credit card.
Mortise LockA lock or latch that is recessed into the edge of a door, rather than being mounted to its surface.
Power usersAccount granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system, but where administrative access is not required.
Protocol Anomaly-Based (IDS)Identifies any unacceptable deviation from expected behavior based on known network protocols.
Proximity Card (prox cards)Use embedded antenna wires connected to a chip within the card through RF.
Records and Information Management (RIM)Essential activities to protect business information and can be established in compliance with laws, regulations, or corporate governance.
RemanenceThe measure of the existing magnetic field on the media after degaussing.
Rim LockA lock or latch typically mounted on the surface of a door, typically associated with a deadbolt type of lock.
SandboxingA form of software virtualization that lets programs and processes run in their own isolated virtual environment.
Security Information and Event Management (SIEM)A group of technologies which aggregate ifnroamtionaboute access controls and selected system activity to store for analysis and correlation.
Service accountsaccounts used to provide privileged access used by system services and core applications.
Smart CardsCredential cards with one or more microchip processing that accepts or processes information and can be contact or contactless.
Statistical Anomaly-based IDSAnalyzes event data be comparing it to typical, known, or predicted traffic profiles in an effort to find potential security breaches.
SteganographyThe science of hiding information
Traffic anomaly-based IDS Identifies any unacceptable deviation from expected behavior based on actual traffic structure.
Time domain Reflectometry (TDR)Send induced radio frequency (RF) signals down a cable that is attached to the fence fabric.
memorize

Recent badges