




免费预览已结束,剩余27页可下载查看
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
信息安全技术术语(中英文)1.0 network security 网络安全1.1 implementsecurity configuration parameters on network devices andothertechnologies.在网络设备和其他设备上实施安全配置参数firewalls 防火墙routers 路由器switches 交换机load balancers负载均衡proxies 代理web security gateways we安b 全网关vpn concentrators vpn网关nids and nips 网络入侵检测与网络入侵防范* behavior based基于行为* signature based基于特征* anomaly based 基于异常* heuristic 启发式protocol analyzers协议分析仪spam filter 垃圾邮件过滤utm security appliances统一威胁管理* url filter url 过滤* content inspection 内容检查-可编辑修改 -* malware inspection 恶意软件检查web application firewall vs. network firewallwe应b 用防火墙与网络防火墙application aware devices应用端设备* firewalls 防火墙* ips 入侵防御* ids入侵检测* proxies 代理1.2 given a scenario,use secure network administration principles.给定一个场景,应用安全网络管理原则rule-based managemen基t 于规则的管理firewallrules 防火墙规则vlan management vlan 管理secure router configuration安全路由配置access control lists访问控制列表port security 端口安全802.1x 802.1xflood guards 流量攻击防护loop protection 环路保护implicit deny 默认拒绝network separation 网络隔离log analysis日志分析unified threat management统一威胁管理1.3 explain networkdesign elements and components.解释网络设计的元素和组件dmz非军事化区 dmz subnetting 子网vlan虚 拟 局 域 网 nat网络地址翻译remote access远程接入telephony 电话nac网络接入控制 nac virtualization 虚拟化cloud computing 云计算* platform as a service平台即服务* software as a service软件即服务* infrastructure as a service基础设施即服务* private 私有云* public 公有云* hybrid混合云* community 社区layered security / defense in depth分层安全 / 深度防御1.4 given a scenario,implement common protocols and services.给定一个场景,实施通用的协议和服务protocols 协议* ipsec* snmp* ssh* dns* tls* ssl* tcp/ip* ftps* https* scp* icmp* ipv4* ipv6* iscsi* fibre channel* fcoe* ftp* sftp* tftp* telnet* http* netbios ports 端口* 21* 22* 25* 53* 80* 110* 139* 143* 443* 3389osi relevance osi相关1.5 given a scenario,troubleshoot security issues related to wireless networking.给定一个场景,对无线组网中的安全问题进行故障排查wpa wpa2wep eap peap leapmac filter mac 过滤disable ssid broadcast禁用 ssid 广播tkipccmpantenna placement power level controls captive portals antenna typessite surveysvpn (over open wireless)2.0 compliance and operational securit合y 规与运维安全2.1 explain theimportance of risk related concepts.解释风险相关概念的重要性control types 控制类型* technical 技术性* management 管理性* operational 操作性false positives误报false negatives漏报importance of policies in reducing risk风险降低策略的重要性* privacy policy 隐私策略* acceptable use可接受使用* security policy 安全策略* mandatory vacations强制度假* job rotation 工作轮换* separation of duties职责分离* least privilege 最小特权risk calculation 风险计算* likelihood 可能性* ale年度预期损失* impact 影响* sle 单次预期损失* aro年度发生率* mttr平均故障维修时间* mttf平均失效前时间* mtbf平 均 故 障 间 隔 时 间 quantitative vs. qualitative定量 vs. 定性vulnerabilities 漏洞threat vectors 威胁probability / threat likelihood 可能性/ 威胁可能性risk-avoidance, transference, acceptance,mitigation, deterrence风险规避,转移,接受,降低,威慑risks associated with cloud computing andvirtualization云计算与虚拟化相关的风险recovery time objective and recovery pointobjective恢复时间目标与恢复点目标2.2 summarize thesecurity implications of integrating systems and data with third parties.总结与第三方集成系统与数据的安全含义on-boarding/off-boarding business partners驻场/ 场外的业务合作伙伴social media networks and/or applications社交媒体网络与应用interoperability agreements互操作协议* sla 服务水平协议* bpa* mou备忘录* isaprivacy considerations隐私考虑risk awareness风险意识unauthorized data sharing非授权数据共享data ownership 数据所有权data backups 数据备份follow security policy and procedures遵从安全策略与程序review agreement requirements to verifycompliance and performance审核协议需求来确认合规性与性能standards 标准2.3 given a scenario,implement appropriate risk mitigation strategies.给定一个场景,实施正确的风险降低策略change managemen变t更管理incident management事件管理user rights and permissions review用s 户权限审核perform routine audits 执行日常审计enforce policies and procedures to prevent dataloss or theft加强策略和程序来阻止数据的损失或失窃enforce technology controls加强技术控制* data loss prevention (dlp) 数据防泄漏( dlp )2.4 given a scenario,implement basic forensic procedures.给定一个场景,实施基本的取证程序order of volatility 波动的顺序capture system image获取系统镜像network traffic and logs 网络流量与日志capture video 获取视频录像record time offset 记录时间偏离take hashes进行哈希校验screenshots截屏witnesses目击者track man hours and expense跟踪记录人员时间和花费 chain of custody 证据链big data analysis大数据分析2.5 summarize commonincident response procedures.总结通用的事件响应程序preparation 准备incident identification 事件识别escalation and notification 升级与通知mitigation steps 缓解步骤lessons learned经验学习reporting 汇报recovery/reconstitution procedures恢复/ 重建程序first responder 第一响应人incident isolation 事件隔离* quarantine 隔离区* device removal 设备清除data breach 数据泄露damage and loss control灾害与损失控制2.6 explain theimportance of security related awareness and training.解释安全相关意识和培训的重要性security policy training and procedure安s 全策略培训与程序role-based training基于角色的培训personally identifiable information个人可识别信息information classification 信息分级* high高* medium 中* low低* confidential 机密* private 隐私* public 工控data labeling, handling anddisposa数l 据标签、处理与废弃compliance with laws, best practices andstandards法律、最佳实践与标准的合规user habits 用户习惯* password behaviors密码行为* data handling 数据处理* clean desk policies桌面清理策略* prevent tailgating 防止尾随* personally owned devices个人拥有的设备new threats and new security trends/alert新s 威胁与新安全趋势 / 警告* new viruses 新病毒* phishing attacks钓鱼攻击* zero-day exploits 零日攻击use of social networking and p2p社会工程和 p2p的使用follow up and gather training metrics tovalidate compliance and security遵从并收集培训度量来验证合规与安全posture 态度2.7 compare andcontrast physical security and environmental controls.比较和对比物理安全环境控制environmental controls 环境控制* hvac空调暖通* fire suppression灭火* emi shielding 防电磁泄漏* hot and cold aisles 冷热通道* environmental monitoring 环境监控* temperature and humidity controls温湿度控制physical security物理安全* hardware locks 硬件锁* mantraps 陷门(双重门)* video surveillance视频监控* fencing 篱笆* proximity readers 接近探测* access list 访问列表* proper lighting 正确的照明* signs 标记* guards 门卫* barricades 栅栏* biometrics 生物识别* protected distribution (cabling)分发保护(线缆)* alarms 报警* motion detection 活动探测control types 控制类型* deterrent 威慑性* preventive 预防性* detective 检测性* compensating 补偿性* technical 技术性* administrative 管理性2.8 summarize riskmanagement best practices.总结风险管理的最佳实践business continuity concepts业务连续性概念* business impact analysi业s 务影响分析* identification of critical systems and components识别关键系统与组件* removing single points of failure消除单点故障* business continuity planning and testing业务连续性规划与测试* risk assessment风险评估* continuity of operations 运维连续性* disaster recovery灾难恢复* it contingency planning it连续性规划* succession planning接班人规划* high availability 高可用性* redundancy 冗余* tabletop exercises桌面演练fault tolerance容错* hardware 硬件* raid raid磁盘阵列* clustering 集群* load balancing 负载均衡* servers 服务器disaster recovery concepts灾难恢复概念* backup plans/policies 备份计划 / 策略* backup execution/frequency 备份执行 / 频率* cold site 冷站* hot site 热站* warm site 温站2.9 given a scenario,select the appropriate control to meet the goals of security.给定一个场景,选择合适的控制来满足安全目标confidentiality 机密性* encryption加密* access controls 访问控制* steganography隐写术integrity 完整性* hashing 哈希* digital signatures 数字签名* certificates 证书* non-repudiation 抗抵赖availability 可用性* redundancy 冗余* fault tolerance 容错* patching 补丁safety 场所安全* fencing 栅栏* lighting 照明* locks 门禁* cctv闭路电视* escape plans逃生计划* drills演练* escape routes逃生路径* testing controls 测试控制重信息安全管理, 对技术的涉及也不太深入, 只有 security+认证才是技术人员专属的。贴两章 security+学习大纲你就知道有多牛了, security+认证一共有六章内容,以下仅仅是 2 个章节的样例。1.0 network security 网络安全1.1 implementsecurity configuration parameters on network devices and othertechnologies.在网络设备和其他设备上实施安全配置参数 firewalls 防火墙routers 路由器switches 交换机load balancers负载均衡proxies 代理web security gateways we安b 全网关vpn concentrators vpn网关nids and nips 网络入侵检测与网络入侵防范* behavior based基于行为* signature based基于特征* anomaly based 基于异常* heuristic 启发式protocol analyzers协议分析仪spam filter 垃圾邮件过滤utm security appliances统一威胁管理* url filter url 过滤* content inspection 内容检查* malware inspection 恶意软件检查web application firewall vs. network firewallwe应b 用防火墙与网络防火墙application aware devices应用端设备* firewalls 防火墙* ips 入侵防御* ids入侵检测* proxies 代理1.2 given a scenario,use secure network administration principles.给定一个场景,应用安全网络管理原则rule-based managemen基t 于规则的管理firewallrules 防火墙规则vlan management vlan 管理secure router configuration安全路由配置access control lists访问控制列表port security 端口安全802.1x 802.1xflood guards 流量攻击防护loop protection 环路保护implicit deny 默认拒绝network separation 网络隔离log analysis日志分析unified threat management统一威胁管理1.3 explain networkdesign elements and components.解释网络设计的元素和组件dmz非军事化区 dmz subnetting 子网vlan虚 拟 局 域 网 nat网络地址翻译remote access远程接入telephony 电话nac网络接入控制 nac virtualization 虚拟化cloud computing 云计算* platform as a service平台即服务* software as a service软件即服务* infrastructure as a service基础设施即服务* private 私有云* public 公有云* hybrid混合云* community 社区layered security / defense in depth分层安全 / 深度防御1.4 given a scenario,implement common protocols and services.给定一个场景,实施通用的协议和服务protocols 协议* ipsec* snmp* ssh* dns* tls* ssl* tcp/ip* ftps* https* scp* icmp* ipv4* ipv6* iscsi* fibre channel* fcoe* ftp* sftp* tftp* telnet* http* netbios ports 端口* 21* 22* 25* 53* 80* 110* 139* 143* 443* 3389osi relevance osi相关1.5 given a scenario,troubleshoot security issues related to wireless networking.给定一个场景,对无线组网中的安全问题进行故障排查wpa wpa2 wep eap peap leapmac filter mac 过滤disable ssid broadcast禁用 ssid 广播tkipccmpantenna placementpower level controls captive portals antenna typessite surveysvpn (over open wireless)2.0 compliance and operational securit合y 规与运维安全2.1 explain theimportance of risk related concepts.解释风险相关概念的重要性control types 控制类型* technical 技术性* management 管理性* operational 操作性false positives误报false negatives漏报importance of policies in reducing risk风险降低策略的重要性* privacy policy 隐私策略* acceptable use可接受使用* security policy 安全策略* mandatory vacations强制度假* job rotation 工作轮换* separation of duties职责分离* least privilege 最小特权risk calculation 风险计算* likelihood 可能性* ale年度预期损失* impact 影响* sle 单次预期损失* aro年度发生率* mttr平均故障维修时间* mttf平均失效前时间* mtbf平 均 故 障 间 隔 时 间 quantitative vs. qualitative定量 vs. 定性vulnerabilities 漏洞threat vectors 威胁probability / threat likelihood 可能性/ 威胁可能性risk-avoidance, transference, acceptance,mitigation, deterrence风险规避,转移,接受,降低,威慑risks associated with cloud computing andvirtualization云计算与虚拟化相关的风险recovery time objective and recovery pointobjective恢复时间目标与恢复点目标2.2 summarize thesecurity implications of integrating systems and data with third parties.总结与第三方集成系统与数据的安全含义on-boarding/off-boarding business partners驻场/ 场外的业务合作伙伴social media networks and/or applications社交媒体网络与应用interoperability agreements互操作协议* sla 服务水平协议* bpa* mou备忘录* isaprivacy considerations隐私考虑risk awareness风险意识unauthorized data sharing非授权数据共享data ownership 数据所有权data backups 数据备份follow security policy and procedures遵从安全策略与程序review agreement requirements to verifycompliance and performance审核协议需求来确认合规性与性能standards 标准2.3 given a scenario,implement appropriate risk mitigation strategies.给定一个场景,实施正确的风险降低策略change managemen变t更管理incident management事件管理user rights and permissions review用s 户权限审核perform routine audits 执行日常审计enforce policies and procedures to prevent dataloss or theft加强策略和程序来阻止数据的损失或失窃enforce technology controls加强技术控制* data loss prevention (dlp) 数据防泄漏( dlp )2.4 given a scenario,implement basic forensic procedures.给定一个场景,实施基本的取证程序order of volatility 波动的顺序capture system image获取系统镜像network traffic and logs 网络流量与日志capture video 获取视频录像record time offset 记录时间偏离take hashes进行哈希校验screenshots截屏witnesses目击者track man hours and expense跟踪记录人员时间和花费 chain of custody 证据链big data analysis大数据分析2.5 summarize commonincident response procedures.总结通用的事件响应程序preparation 准备incident identification 事件识别escalation and notification 升级与通知mitigation steps 缓解步骤lessons learned经验学习reporting 汇报recovery/reconstitution procedures恢复/ 重建程序first responder 第一响应人incident isolation 事件隔离* quarantine 隔离区* device removal 设备清除data breach 数据泄露damage and loss control灾害与损失控制2.6 explain theimportance of security related awareness and training.解释安全相关意识和培训的重要性security policy training and procedure安s 全策略培训与程序role-based training基于角色的培训personally identifiable information个人可识别信息information classification 信息分级* high高* medium 中* low低* confidential 机密* private 隐私* public 工控data labeling, handling anddisposa数l 据标签、处理与废弃compliance with laws, best practices andstandards法律、最佳实践与标准的合规user habits 用户习惯* password behaviors密码行为* data handling 数据处理* clean desk policies桌面清理策略* prevent tailgating 防止尾随* personally owned devices个人拥有的设备new threats and new security trends/alert新s 威胁与新安全趋势 / 警告* new viruses 新病毒* phishing attacks钓鱼攻击* zero-day exploits 零日攻击use of social networking and p2p社会工程和 p2p的使用follow up and gather training metrics tovalidate compliance and security遵从并收集培训度量来验证合规与安全posture 态度2.7 compare andcontrast physical security and environmental controls.比较和对比物理安全环境控制environmental controls 环境控制* hvac空调暖通* fire suppression灭火* emi shielding 防电磁泄漏* hot and cold aisles 冷热通道* environmental monitoring 环境监控* temperature and humidity controls温湿度控制physical security物理安全* hardware locks 硬件锁* mantraps 陷门(双重门)* video surveillance视频监控* fencing 篱笆* proximity readers 接近探测* access list 访问列表* proper lighting 正确的照明* signs 标记* guards 门卫
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 搬迁安置考试题库及答案
- 建筑安全员知识题库试题(含答案)
- 租赁合同纠纷案例分析试题及答案
- 2025年城市生态修复项目社会稳定风险评估与政府决策支持报告
- 2025年宠物市场细分需求研究报告:宠物美容培训与宠物行业人才创新分析
- 2025年汽车行业供应链韧性评估与供应链风险管理咨询项目经验总结方案实施报告
- 2025年文化娱乐行业消费者消费习惯与市场细分研究报告001
- 2025年康复医疗服务体系康复康复与康复康复服务产业链发展预测策略研究报告
- 2025年生物质能源在分布式能源系统中的环保效益与风险评估报告
- 2025年绿色金融产品创新与绿色金融风险管理技术创新应用前景困境与对策报告
- 施工工艺标准化做法实施图集汇编
- 精神运动发育迟缓护理要点
- 二年级上学期收心教育
- 车位包销合同协议书范本
- 2025年医师执业资格考试试题及答案
- 教师名师笔试试题及答案
- 并购协议样本3篇
- 2025浙江申论a卷真题及答案
- 中考满分作文10篇(精读细研)
- 测定不确定度试题及答案
- 钢结构工程数字化交付标准制定
评论
0/150
提交评论