wk8wk9networksecurity.docx

Wk 8 Key terms:

Annualized loss expectancy (ALE)

•Annualized rate of occurrence (ARO)

•Asset

•Availability

•Control

•Countermeasure

•Exposure factor

•Hazard

•Impact

•Intangible impact

Baseline

•Capability Maturity Model Integration (CMMI)

•Change control board (CCB)

•Change management

•Computer software configuration items

•Configuration auditing

•Configuration control

•Configuration identification

Configuration items

•Configuration management

Wk 9 Key terms

Advanced persistent threat (APT)

•Computer Emergency Response Team (CERT)

•Computer Incident Response Team (CIRT)

•Cyber kill chain

•Cyber Observable eXpression (CybOX)

•Data minimization

•Footprinting

•Incident

•Incident response

•Incident response policy

Best evidence rule

•Competent evidence

•Demonstrative evidence

•Direct evidence

•Documentary evidence

•Evidence

•Exclusionary rule

•Forensics

•Free space

•Hearsay rule

Administrative law

•Case law

•Click fraud

•Common law

•Computer Fraud and Abuse Act (CFAA)

•Computer trespass

•Digital Millennium Copyright Act (DMCA)

•Electronic Communications Privacy Act (ECPA)

•Gramm-Leach-Bliley Act (GLBA)

Leave a Comment

Dont compromise on quality.
Our Writers will service all your academic needs perfectly.

order now