an electronic document that associates credentials with a public key
the proccess of identifying end users in a transaction that involves a series of steps to be carried out before the user's identity is confirmed
Subordinate CA
if a user, server, or client machine does not have the right cert, there is nothing you can do to secure communications to or from that entity
users and other entities obtain certs from the CA through the ..
authentication is determined by the cert policy requirements (ID/password, driver's license)
why did the connection fail
you should renew certs appropriately so that you do not have any interruptions in your security services
an alternative to key backups, can be used to store private keys securely, while allowing one or more trusted third parties access to the keys under predefined conditions
an HTTP based alternative to a CRL for checking the status of revoked certs. The responder uses the certs serial number to search for it in the CA's database
deterrent, preventive, detective, compensating, technical, administrative
the practice of ensuring that the requirements of legislation, regulations, industry codes, and standards, and organizational standards are met
info security professionals must observe generally accepted forensic practices when investigating security incidents
common information classifications
correspondence of a private nature between two people that should be safeguarded
this agreement clearly defines what services are to be provided to the client, and what support if any will be provided
evaluation of an organization, a portion of an organization, an info system, or system components to assess the security risk
evaluation of known threats to an organization and the potential damage to business operations and systems
hardware/software installations that are implemented to monitor and prevent threats and attacks to computer systems and services
reviews may be carried out manually by a developer, or automatically using a source cod analysis tool
completed before a security implementation is applied, the reviewer can determine if the security solution will in fact fulfill the needs of an organization
also known as profiling, the attacker chooses a target and begins to gather info that is publicly or readily available
also called banner grabbing, the second step is to scan an organization's infrastructure or systems to see where vulnerabilities might lie
where the tester is given no specific information about the structure of the system being tested
where the tester has partial knowledge of internal architectures and systems
when the tester knows all aspects of the system and understands the function and design of the system before the test is conducted
the position an organization takes on securing all aspects of its business
a software solution that detects an prevents sensitive info in a system from being stolen or falling into the wrong hands
a specific instance of a risk event occurring, whether or not it causes damage
the set of practices and procedures that govern how an organization will respond to an incident in progress
a criminal act that involves using a computer as a source or target, instead of an individual
1. Assess the level of damage
2. Recover from the incident
3. Report the incident
should be done to determine the extent of damage, the cause, and the amount of expected downtime
a report that includes a description of the events that occurred during a security incident
a policy that defines how an organization will maintain normal day-to-day business operations in the event of business disruption or crisis
a preparation step in BCP development that identifies present organizational risks and determines the impact to ongoing, business-critical operations and processes if such risks actually occur
a component of the BCP that specifies alternate IT contingency procedures that you can switch over to when you are faced with an attack or disruption in service leading to a disaster for the organization
Disaster Recovery Plan
the rating on a device or devices that predicts the expected time between failures
action-based sessions where employees can validate DRPs by performing scenario-based activities in a simulated environment
should be conducted to determine the extent of incurred facility damages, to identify the cause, estimate downtime, and can also determine the appropriate response strategy
a group of designated individuals who implement recovery procedures and control recovery operations in the event of an internal or external disruption to critical business processes
all selected files that have changed since the last full or differential backup are backed up
backing up sensitive or important data is only part of the solution, as that backup also needs to be secure