Chapter 7 Security Key Terms Flashcards
mantrap
An area with two locking doors.
Radio-frequency identification (RFID) technology
a technology that consists of an RFID tag that can broadcast information about an item, as well as an RFID reader to accept the broadcast information and deliver it to a computer system for use
smart card
A credit card–sized card that contains stored information and might also contain a simple microprocessor or an RFID chip
biometric security
The use of a person’s biological information, such as fingerprints, retina scans, or facial recognition, to authenticate a potential user of a secure area.
token
A device, also known as a security token, that owners carry to authorize access.
cable lock
A lock that uses a multistranded security cable to help prevent the theft
of a computer or another technology device. Sometimes called a Kensington lock. A lock that uses a multistranded security cable to help prevent the theft of a computer or another technology device. Sometimes called a Kensington lock.
USB lock
A lock used to secure USB cables into a computer and to securely plug empty USB ports.
privacy screen
A screen placed over a monitor to limit visibility for people standing nearby
key fob
A type of security token that generates access codes for authentication
entry control roster
A list of individuals or representatives who are authorized to enter a secured area that can be used with a variety of security systems.
Active Directory Service
A Microsoft solution for managing users, computers,
and information access in a network.
login script
A script that Active Directory runs to make assigned resources available to a user who logs on to a network.
domain
A computer network or group of computer networks under the same
administration
Group Policy
A set of rules and instructions defining what a user or group of users
can or cannot do when logged into a domain.
Organizational Unit (OU)
A logical group that can be used to organize users and
computers so that Group Policy Objects (GPOs) can be assigned to them
home folder
A file in which a user’s data and files are kept locally but are accessible to the network administrator.
folder redirection
A process that allows for the work done by an Organizational Unit (OU) to be saved on a common folder in the domain, as directed by the administrator instead of the user.
software token
Software security information used for authentication; generally
stored on a device. Can be generated by an app such as Google Authenticator.
mobile device management (MDM)
A way to manage the mobile devices within
an enterprise. For example, can ensure that all mobile users on the network have
updated security files
MAC address
Sometimes known as a physical address, a unique identification address for any device that has a network adapter and that consists of six two-digit hexadecimal numbers. For example, a typical PC MAC address is
FA-15-B7-89-6C-24.
whitelisting
The practice of providing network access to only certain devices.
MAC address filtering
A method of securing networks by allowing only devices with known MAC addresses into the network.
MAC address cloning
The process of using software to change the MAC address of a network device.
certificate
A means of identifying a software publisher to ensure that it is
legitimate