Pages

Saturday, January 27, 2018


(i)Controls designed to correct the errors or irregularities that have been detected are known as corrective controls.
(ii)Controls designed to prevent errors or irregularities from occurring are known as preventive controls.
(iii)Controls designed to detect errors or irregularities that may have occurred are known as detective controls.
(iv)Controls that reduce the likelihood of a deliberate act to cause a loss or an error are known as deterrent controls.

Monday, January 22, 2018

Backup


Full Backup- Every time data backup is taken of full database irrespective of earlier backup.

Differential Backup-Backup is taken only of data changed/modified since last full backup (last back to be full back-up only).

Incremental Backup-Backup is taken only of data changed/modified since last backup (last backup can be either full backup or incremental backup).

Sunday, January 21, 2018

Attack

Eavesdropping attack

Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)

spoofing attack

is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

masquerade

Impersonating another user, usually with the intention of gaining unauthorized access to a system


noun

1.a false show or pretence.
synonyms:
pretence, deception, pose, act, front, facade, disguise, dissimulation, cover-up, bluff, subterfuge, play-acting, make-believe

verb
1.pretend to be someone one is not.

synonyms:
pretend to be, pose as, pass oneself off as, impersonate, disguise oneself as, simulate, profess to be;
rarepersonate


 

Definition


Traffic engineering
To ensure that quality of service requirements are achieved, the VoIP service over the WAN should be protected from packet losses, latency or jitter. To reach this objective, the network performance can be managed using statistical techniques such as traffic engineering.

Optimal Business Continuity Strategy


Is determined by lowest sum of downtime cost and recovery cost. Both costs have to be minimized, and the strategy for which the sum of the costs is the lowest is the optimal strategy

buffer overflow

An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

brute force attack

an attack on a password that repeatedly tries to re-create it through a random combination of characters

Wednesday, January 3, 2018

Some Explanation

Encrypting the prehash code using the sender's private key provides assurance of the authenticity of the message. Encrypting the prehash code and the message using the secret key provides confidentiality.

Mathematically deriving the prehash code provides integrity to the message. 


A web content filter accepts or denies web communications according to the configured rules. To help the administrator properly configure the tool, organizations and vendors have made available URL blacklists and classifications for millions of web sites. 
A stateful inspection firewall is of little help in filtering web traffic since it does not review the content of the web site nor does it take into consideration the sites classification.
 A web cache server is designed to improve the speed of retrieving the most common or recently visited web pages. 
A proxy server is incorrect because a proxy server is a server which services the request of its clients by forwarding requests to other servers. Many people incorrectly use proxy server as a synonym of web proxy server even though not all web proxy servers have content filtering capabilities.

Data owners are primarily responsible for authorizing access to production data on a need-to-know basis. System administrators and security administrators are both data custodian roles; they are responsible for ensuring the appropriate safeguards are available and functional. Process owners are in an ideal position to define the appropriate controls since they have a greater knowledge of the process objectives; however, they are not the best suited to authorize access to specific data.