Term
Device that uses passive listening devices |
|
Definition
|
|
Term
Accounts that are assigned only to named individuals that require administrative access to the system to perform maintenance activities, and should be different and separate from a user's normal account. |
|
Definition
|
|
Term
Devices that use a magnetic field or mechanical contact to determine if an alarm signal is initiated |
|
Definition
Balanced Magnetic Switch (BMS) |
|
|
Term
The who, what, when, where, and how the evidence was handled—from its identification through its entire life cycle, which ends with destruction, permanent archiving, or returning ot owner. |
|
Definition
|
|
Term
A lock controlled by touch screen, typically 5 to 10 digits that when pushed in the right combination the lock will releases and allows entry |
|
Definition
|
|
Term
A discipline for evaluating, coordinating, approving or disapproving, and implementing changes in artifacts that are used to construct and maintain software systems |
|
Definition
Configuration management (CM) |
|
|
Term
A suite of technologies aimed at stemming the loss of sensitive information that occurs in the enterprise. |
|
Definition
Data Leak Prevention (DLP) |
|
|
Term
The practice of monitoring and potentially restricting the flow of information outbound from one network to another |
|
Definition
|
|
Term
A focused infrared (IR) light beam is projected from an emitter and bounced off of a reflector that is placed at the other side of the detection area |
|
Definition
Infrared Linear Beam Sensors |
|
|
Term
Provide a quick way to disable a key by permitting one turn of the master key to change a lock |
|
Definition
|
|
Term
A technology that alerts organizations to adverse or unwanted activity |
|
Definition
Intrusion Detection System (IDS) |
|
|
Term
The party to party litigation costs resulting from its breach of warranties |
|
Definition
|
|
Term
A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity. |
|
Definition
Intrusion Prevention System (IPS) |
|
|
Term
Decoy servers or systems setup to gather information regarding an attacker or intruder into your system |
|
Definition
|
|
Term
A centralized collection of honeypots and analysis tools |
|
Definition
|
|
Term
Two or more honeypots on a network |
|
Definition
|
|
Term
Data that are dynamic and exist in running processes or other volatile locations (e.g., system/device RAM) that disappear in a relatively short time once the system is powered down |
|
Definition
|
|
Term
States that when a crime is committed, the perpetrators leave something behind and take something with them, hence the exchange |
|
Definition
Locard's exchange principle |
|
|
Term
Consist of a magnetically sensitive strip fused onto the surface of a PVC material, like a credit card |
|
Definition
Magnetic Stripe (mag stripe) cards |
|
|
Term
A lock or latch that is recessed into the edge of a door, rather than being mounted to its surface. |
|
Definition
|
|
Term
Accounts granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system, but where administrative access is not required |
|
Definition
|
|
Term
Identifies any unacceptable deviation from expected behavior based on known network protocols |
|
Definition
Protocol Anomaly-Based IDS |
|
|
Term
Use embedded antenna wires connected to a chip within the card through RF. |
|
Definition
Proximity Card (prox cards) |
|
|
Term
Essential activities to protect business information and can be established in compliance with laws, regulations, or corporate governance |
|
Definition
Records and Information Management (RIM)
Records and Information Management (RIM) |
|
|
Term
The measure of the existing magnetic field on the media after degaussing |
|
Definition
|
|
Term
A lock or latch typically mounted on the surface of a door, typically associated with a dead bolt type of lock |
|
Definition
|
|
Term
A form of software virtualization that lets programs and processes run in their own isolated virtual environment |
|
Definition
|
|
Term
A group of technologies which aggregate information about access controls and selected system activity to store for analysis and correlation |
|
Definition
Security Informatn and Event Management (SIEM) |
|
|
Term
Accounts used to provide privileged access used by system services and core applications |
|
Definition
|
|
Term
Credential cards with one or more microchip processing that accepts or processes infomraiton and can be contact or contact less. |
|
Definition
|
|
Term
Analyzes event data by comparing it to typical, known, or predicted traffic profiles in an effort to find potential security breaches |
|
Definition
Statistical Anomaly-based IDS |
|
|
Term
The science of hiding information |
|
Definition
|
|
Term
Identifies any unacceptable deviation from expected behavior based on actual traffic structure |
|
Definition
Traffic anomaly-based IDS |
|
|
Term
Send induced radio frequency (RF) signals down a cable that is attached to the fence fabric |
|
Definition
Time domain Reflectometry (TDR) |
|
|