9781111640125_IM_ch05

Security+ Guide to Network Security Fundamentals

  • Notes
  • 7
  • 100% (1) 1 out of 1 people found this document helpful

This preview shows page 5 - 7 out of 7 pages.

Answer: Application development 2. Application ____ is intended to prevent exploiting vulnerabilities in software applications. Answer: hardening 3. ____ is defined as a security analysis of the transaction within its approved context. Answer: Content inspection Class Discussion Topics 1. Have students discuss the importance of monitoring logs on a regular basis. 2. Discuss with students that regulatory requirements that might require an organization to implement a DLP solution, like PCI, HIPPA, or SOX. Additional Projects 1. Have students research the timeline for Kevin Mitnick’s famous attack and how he was ultimately caught. 2. Have students research the potential costs and requirements for an organization in their home state or province, should there be a data breach. Additional Resources 1. ‘Boil the ocean’ data loss prevention needs to change 2. Dealing with a Data Breach 3. Email Security Teaching Tip Explain that DLP is a luxury for some, but for regulated industries, DLP is a necessary business tool.
Image of page 5

Subscribe to view the full document.

Security+ Guide to Network Security Fundamentals, Fourth Edition 5-6 4. Trusted Source Internet Reputation System 5. Physical Network Security Key Terms access list A record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area. access log A log that can provide details regarding requests for specific files on a system. anti-spyware Software that helps prevent computers from becoming infected by different types of spyware. anti-virus (AV) Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus. audit log A log that can track user authentication attempts. audit records Logs that are the second common type of security-related operating system logs. Bayesian filtering Spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if it is spam. cable lock A device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen. closed-circuit television (CCTV) Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring.
Image of page 6
Image of page 7
You've reached the end of this preview.
  • '
  • NoProfessor
  • Computer Security, Network Security Fundamentals, Security+ Guide

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern