Upgrade to remove ads
Digital forensics final 2
Terms in this set (15)
defense in depth (DiD)
The NSA's approach to implementing a layered network defense strategy. It focuses on three modes of protection: people, technology, and operations.
A type of DoS attack in which other online machines are used, without the owners' knowledge, to launch an attack.
A computer or network set up to lure an attacker.
Intrusion prevention and monitoring systems that track what attackers do on honeypots.
layered network defense strategy
An approach to network hardening that sets up several network layers to place the most valuable data at the innermost part of the network.
Any code used to cause damage to a system, including viruses, worms, Trojan programs, and so on.
The process of collecting and analyzing raw network data and systematically tracking network traffic to determine how security incidents occur.
order of volatility (OOV)
A term indicating how long an item on a network lasts. RAM and running processes might last only milliseconds; items stored on hard drives can last for years.
Devices and software used to examine network traffic. On TCP/IP networks, they examine packets (hence the name).
type 1 hypervisor
A virtual machine interface that loads on physical hardware and contains its own OS.
type 2 hypervisor
A virtual machine interface that's loaded on top of an existing OS.
Virtualization Technology (VT)
Intel's CPU design for security and performance enhancements that enable the BIOS to support virtualization
Virtual Machine Extension (VMX)
Instruction sets created for Intel processors to handle virtualization.
zero day attacks
Attacks launched before vendors or network administrators have discovered vulnerabilities and patches for them have been released.
A computer used without the owner's knowledge in a DDoS attack.
YOU MIGHT ALSO LIKE...
IST 454 Quiz 7
Computer Forensics: Ch 10
Computer Forensics Chapter 11
Ch. 11 Vocab
OTHER SETS BY THIS CREATOR
Digital forensics final 7
Digital forensics final 6
Digital forensics final 5
Digital forensics final 4