WGU C178 Study Terms for Exam.pdf

WGU C178 Study Terms for Exam.pdf - Western Governors C178...

This preview shows 1 out of 3 pages.

Western Governors - C178 Key Terms for Assessment (ASC) 1. 802.1X:: adding port authentication to MAC filtering takes security for the network down to the switch port level and increases your security exponentially. The IEEE standard 802.1X defines port-based security for wireless network access control.As such, it offers a means of authentication and defines the Extensible Authentication Protocol (EAP) over IEEE 802.The biggest benefit of using 802.1X is that the access points and the switches do not need to do the authentication but instead rely on the authentication server to do the actual work. 2. Access control lists (ACLs): enable devices in your network to ignore requests from specified users or systems or to grant them certain network capabilities. You may find that a certain IP address is constantly scanning your network, and you can block this IP address. If you block it at the router, the IP address will automatically be rejected any time it attempts to utilize your network. ACLs allow a stronger set of access controls to be established in your network. The basic process of ACL control allows the administrator to design and adapt the network to deal with specific security threats. 3. access control lists (ACLs): which can hold permissions for local users and groups, but each entry in the ACL can specify what type of access is given, such as Read-Only, Change, or Full Control. 4. Act in Order of Volatility: When dealing with multiple issues, address them in order of volatility (OOV); always deal with the most volatile first. Volatility can be thought of as the amount of time you have to collect certain data before that window of opportunity is gone. Naturally, in an investigation, you want to collect everything, but some data will exist longer than others, and you cannot possibly collect all of it once. As an example, the OOV in an investigation may be RAM, hard drive data, CDs/DVDs, printouts. 5. administrative control: is one that comes down through policies, procedures, and guidelines. An example of an administrative control is the escalation procedure to be used in the event of a break-in: who is notified first, who is called second, and so on. Another example of an administrative control is the list of steps to be followed when a key employee is terminated: disable their account, change the server password, and so forth. 6. Alarms: re indications of an ongoing current problem currently. Think of a siren sounding when someone kicks in the door to a home. These are conditions to which you must respond right now. 7. ALE: Annualized loss expectancy - is a monetary measure of how much loss you could expect in a year. 8. alerts: Slightly below alarms in terms of security issues --Alerts are issues to which you need to pay attention but are not about to bring the
Image of page 1

Subscribe to view the full document.

system down at any moment. (Think of them as storm watches instead of storm warnings.) In Event Viewer, for example, system events are identified either as errors, information, or warnings. Although errors are the most critical, the others need attention too in order to keep them from eventually becoming errors.
Image of page 2
Image of page 3
You've reached the end of this preview.
  • Fall '17

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern