Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CIT292 Network Security Key Terms Chapters 3 and 4

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
hardening   Act of configuring OS security, updating it, creating rules and policies to help govern system in a secure manner and removing unnecessary apps and services  
🗑
service pack (SP)   Group of updates, bug fixes, updated drivers, and security fixes that are installed in one downloadable package or one disc.  
🗑
Hotfix   Single problem fixing patch to an individual OS or application installed live while system up and running without reboot. Now varies from vendor to vendor.  
🗑
Patch   Update to a system. Patches generally carry the connotation of a small fix in the mind of the user or system admin, so larger patches ofter referred to as software updates or service packs.  
🗑
Patch Management   Planning, testing, implementing, and auditing of patches.  
🗑
Group Policy   Used in Microsoft environments to govern user and computer accounts through a set of rules.  
🗑
Security Template   Groups of policies that can be loaded in one procedure.  
🗑
Baselining   Process of measuring changes in networking, hardware, software, and so on.  
🗑
Virtualization   Creation of a virtual entity, as opposed to a true or actual entity.  
🗑
Virtual Machine   (VM) Created by virtual software; images of OS's or individual apps.  
🗑
Hypervisor   Portion of virtual machine software that allows multiple virtual operating systems (guests) to run at same time on single computer.  
🗑
Cookies   Text files placed on client computer that store information about it, which could include computer browsing habits and credentials. Used by spyware to collect info about users activities. Session cookies used by attacker to hijack session.  
🗑
Buffer overflow   Process stores data outside memory that developer intended. Could cause erratic behavior in application, especially if memory already had data in it.  
🗑
UAC User Account Control   Security component of Windows Vista that keeps every user (not Admin account) in standard user mode instead of administrator with full administrative rights - even if member of administrators group.  
🗑
Systems Development Life Cycle (SDLC)   Process of creating systems and apps, and the methodologies used to do so. Separated into six phases: Planning and analysis, system design, implementation, testing, deployment, and maintenance.  
🗑
Secure Code Review   In-depth code inspection procedure.  
🗑
Secure Coding Concepts   Best practice used during the life cycle of software development.  
🗑
Fuzz Testing   (fuzzing) When random data is input into computer program to find vulnerabilities.  
🗑
cross-site scripting (XSS)   Type of vulnerability found in web apps used with session hijacking.  
🗑
Cross-site request forgery (XSRF)   Attack that exploits the trust a website has in a user's browser in attempt to transmit unauthorized commands to website.  
🗑
Input validation   Also know as data validation is a process that ensures the correct usage of data.  
🗑
Sandbox   When web script runs in its own environment for the express purpose of not interfering with other processes, possibly for testing.  
🗑
Directory traversal   Also known as ../ (dot dot slash) attack method of accessing unauthorized parent directories.  
🗑
Zero day attack   Attack executed on a vulnerability in software before that vulnerability is known to the creator of the software.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Leisac
Popular Computers sets