more days. However, not all critical resources at a site are destroyed.
Disaster recovery plan Sometimes called a business continuity plan. Addresses actions taken during and immediately following a disaster.
Dynamic ARP Inspection (DAI) Uses trusted and untrusted ports. ARP replies are allowed
into the switch on trusted ports. However, if an ARP reply enters the switch on an untrusted port, the contents of the ARP reply are compared to the DHCP binding table to verify its accuracy. If the ARP reply is inconsistent with the DHCP binding table, the ARP reply is dropped, and the port is disabled.
Dynamic firewall This fourth-generation firewall technology, sometimes called a stateful firewall, keeps track of the communication process through the use of a state table. This firewall
operates at Layers 3, 4, and 5.
Education More comprehensive than training because it covers a larger body of knowledge.
Obtaining a college degree focusing on IT security is an example of a comprehensive security education.
access to resources that normally would be protected from an application or user. The result is that the application performs actions with more privileges than intended by the application developer or system administrator.
Encapsulating Security Payload (ESP) An Internet standard that allows for the authentication and encryption of IP packets. ESP over Fibre Channel provides a means of protecting data in transit throughout the Fibre Channel network. However, it does
not address the need to secure data while it is stored on the Fibre Channel network.
Exploit A malicious program designed to take advantage of a vulnerability.

No comments:
Post a Comment