Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

SECURITY+

QuestionAnswer
SLE Single loss expetancy = Asset Value x Exposure factor%
Single Loss expectancy how much loss experienced during one negative incident
AV ASSet Value
EF Exposure Factor Percentage of value loss when negative incident occurs IN the video exposure factor for 3 hours of downtime is calculated by 24/3
ARO Annualized rate of occurance Expected number of yearly occurances of an incident
ALE Annualized Loss Expectancy = SLE x ARO Total yearly cost of bad things happening
Qualitative Risk Assesment Based on subjective opinions regarding : -threat Liklihood -impact of realiced threat Threats given a severity rating low med hi 321 risk matrix & heat map
Risk Register Centralized list of risks, severities, resposibilities, and mitigations
HBA Host Bus Adapter- physical card u plug into computer or server to connect to a storage area network or other storage/network devic. The terms are primarily used to refer to devices for connecting SCSI, SAS, NVMe, Fibre Channel and SATA devices.
Authorization Gaining acceess to a resoource (ccurs only after successfull authentication)
where do you store SSH public Keys? On the server or the users home directory in the "Authorized Keys" folder
Virus Program that can replicate only thru a definite user interaction Has some form of activation.
ransomware cryptoransomware cryptomalware uses encryption to lock auser out of a system. attacker hides your data until you pay a ransom
worm virus that once started, replicates itself more like a pathway for replication
Trojan horse Program that looks benign or useful but hides nefarious programs or code insidde it... no replication by itself... Remote acces Trojan RAT- takes control of a system remotely
backdoor Not necessarily bad created by devs as easy access point. can be exploited by attackers if left open. can be a program hackers us
PUP- Potentially Unwanted Program Crapware adware spyware bloatware
Bots/Botnets Distributed attack using remotely controlled malware controlling several machines . Often used in DDoS
EDR Endpoint Detection and Response
Raid 0 Disk stripping Requires at least 2 disks offers performance advantage but no avail or redundancy Data is segmented and striped across each disk appears as multiple disks
RAID 1 Disk Mirroring Requires at least 2 disks... Looks like 1 disk Data in its entirety is written to 2 disks. performance and availability benefit. No fault tolerance
RAID 5 Disk stripping with Distributed Parity . Requires atleast 3 disks. looks like 1 disk in system Data stripe and its related parity is stored on seperate disks can tolerate 1 disk failure
Parity (Raid ) Error recovery or rebuilding information
RAID 6 Requires at least 4 disks stores 2 parity stripes on ea disk can tolerate failure of 2 disks
RAID 10 Raid level 1, then 0 Disk Mirroring, Then Stripping requires at least 4 disks
Packet Filetering Firewall goes to Up to OSI layer 4
Deep packet inspection firewall Up to layer 7
NGFW Next Generation Firewal
FDE Full DIsk Encryption- Ensures all data on a drive is encrypted... cant pull drive out of cpu and use it elsewhere
Partition Encryption Encrypts individual partitions (Sections) of a drive Can have some encrypted and some unencrypted
File Encryption encrypts individual files protects specific sensitive files
Volume Encryption Encrypts an entire volume (logical data unit) of a hard drive Can be done on a drive, external drive, or a virtual drive broader than file encryption... more targeted than fde Can be thought of as a shelf or a rack in a library
Databases Encrypts an entire database protects the whole collection of data in the database ...
Record Encryption encrypts individual entries in a database records area single set of data in a database, like a row in the table
Control / Management Plane responsible for determining the best path for data to travel from source to destination uses routing protocols to do this communicates changes in network topology
Data Plane moves data to its final destination sometimes called the forwarding plane processes and transmits data packets.
Policy engine Sets strict rules never assume anyone is harmless
Policy enforcement point Ensures rules are followed by checking and verifying constantly
Policy automation advanced tools to ensure discrepancies are caught and acted upn
load balancing improves availability, and service performance. Horizontally auto-scaled
Horizontally auto scaled: scaling out add servers
Horizontally auto scaled: Scaling in remove servers
Round-Robin Each request goes to the next backend server
Least-Connections Each request is sent to the least busy backend server
Weighted Value A relative numeric value assigned to each backend server
Server Clustering Linking multiple servers together to operate as one system
RTO
RPO
MTTR Mean Time To Repair
MTBF
Granular Trap
Verbose trap
MIB
OID
Throughput network performance metrics used to represent the actual measure of how much data is successfully transferred from a source to a destination in a given amount of time
Bandwidth Theoretical speeed
DNS RECORDS
Data Controller Identifies purposes and conditions of the of data processing and ensures compliance with legal standards
BPA Business Process Analysis
probability Probability is a quantitative measure, usually expressed as a number between 0 and 1, or as a percentage, indicating the statistical likelihood of a risk event.
likelihood Likelihood measures how probable it is that a risk will occur in a given time frame.
aro
frequency
Data custodian
data processor Data processors process data on behalf of the data controller
Data controller A data controller determines the purposes and means of processing personal data, but the classification and alignment with organizational policies is typically under the purview of the data owner.
data owner A Data owner is typically responsible for the data's classificationa dn insuring it is inline with the orgs security policy
EDR Endpoint Detection and Response
Applications monitoring
systems monitoring
infrstructure monitoring
The execution phase of security awareness The Execution phase is where security awareness policies and procedures are put into operation, encompassing actions like user training, dissemination of awareness resources, and monitoring the efficacy of the awareness initiative.
optimization phase Optimization is a post-execution phase, concentrating on refining and enhancing the security awareness programs based on outcomes and feedback, without direct involvement in its active implementation.
feedback phase is before the execution. The Feedback phase involves gathering reactions and responses from users after the introduction of security policies, not necessarily involving active training or distribution of resources.
Inition phase Initiation is the initial phase where potential security threats are recognized, but no policies or procedures have been formulated or implemented yet.
Key stretching Key stretching is a method used that repeatedly hashing the password to make it more random and longer than it originally appeared.
Datamasking Data masking is an obfuscation type which redacts the data by substituting the data with a character like an X or a *. The structure of the string is not changed so, for example, a 10 digit phone number would appear with 10 Xs.
Stagenography Data is embedded in a picture or some other source
Tokenization In Tokenization, the data is replaced with a token which has a different structure. The token is used to point to the data. Key stretching is not a data obfuscation technique. It is a technique used to protect passwords.
SOW
BPA -Business Partners Agreement Business Partners Agreement is a type of agreement that outlines the terms and conditions of a partnership between two organizations, not the specific instructions and requirements for a particular project.
MSA A Master Service Agreement (MSA) establishes the overall framework for a long-term business relationship between an organization and a vendor.
Fines Financial penalties
Sanctions non fincial penalties
Mandatory access control -Uses security labels to authorize resource access - Requires assigning security labels to both users and resources -Access is granted only if the user's label is equal to or higher than the resource's label
Discretionary access control -● Resource owners specify which users can access their resources ● Access control based on user identity, profile, or role ● Allows resource owners to grant access to specific users
All the access controls
SCAP Security Content Automation Protocol
Which of the following statements about the importance of the Security Content Automation Protocol (SCAP) is NOT true? SCAP encrypts all data before it is sent to be securely stored
Kelly Innovations LLC wants to expand its infrastructure across multiple geographical locations with an extensive network. Which of the following solutions would be the BEST for their situation? SD-WAN
Risk Management Process steps in order TEST1 TEST1
Attribute based authentication control
Rule based Authentication control
Role based access control
Discretionary
Mandatory
Passskey??????
Hardware Token Like an RSA token
Created by: Studyingsux
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards