Term
|
Definition
|
__d__ 1. Vulnerability
|
Code that corrects a flaw in a program.
|
__s__ 2. Exploit
|
Verification of claimed identity.
|
__b__ 3. Authentication
|
The firewall technique that filters traffic by comparing the information in packet headers to a table of established connections.
|
__m__ 4. Authorization
|
A flaw or weakness in a program.
|
__f__ 5. Demilitarized zone (DMZ)
|
A test to determine the time it takes to compromise a system.
|
__t__ 6. Deep packet inspection
|
A subnetwork that is accessible from the Internet but separate from the organization’s internal network.
|
__o__ 7. router
|
The device that connects the organization to the Internet.
|
__j__ 8. social engineering
|
The rules (protocol) that govern routing of packets across networks.
|
__k__ 9. firewall
|
The rules (protocol) that govern the division of a large file into packets and subsequent reassembly of the file from those packets.
|
__n__ 10. hardening
|
An attack that involves deception to obtain access.
|
__l__ 11. CIRT
|
A device that provides perimeter security by filtering packets.
|
__a__ 12. patch
|
The set of employees assigned responsibility for resolving problems and incidents.
|
___u_ 13. virtualization
|
Restricting the actions that a user is permitted to perform.
|
__i__ 14. Transmission Control Protocol (TCP)
|
Improving security by removal or disabling of unnecessary programs and features.
|
_q___ 15. static packet filtering
|
A device that uses the Internet Protocol (IP) to send packets across networks.
|
__g__ 16. border router
|
A detective control that identifies weaknesses in devices or software.
|
__p__ 17. vulnerability scan
|
A firewall technique that filters traffic by examining the packet header of a single packet in isolation.
|
__e__ 18. penetration test
|
The process of applying code supplied by a vendor to fix a problem in that vendor’s software.
|
_r___ s. patch management
|
Software code that can be used to take advantage of a flaw and compromise a system.
|
_v___ t. cloud computing
|
A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet.
|
|
The process of running multiple machines on one physical server.
|
|
An arrangement whereby a user remotely accesses software, hardware, or other resources via a browser.
|