Chapter 7 Security Key Terms Flashcards

1
Q

mantrap

A

An area with two locking doors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Radio-frequency identification (RFID) technology

A

a technology that consists of an RFID tag that can broadcast information about an item, as well as an RFID reader to accept the broadcast information and deliver it to a computer system for use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

smart card

A

A credit card–sized card that contains stored information and might also contain a simple microprocessor or an RFID chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

biometric security

A

The use of a person’s biological information, such as fingerprints, retina scans, or facial recognition, to authenticate a potential user of a secure area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

token

A

A device, also known as a security token, that owners carry to authorize access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

cable lock

A

A lock that uses a multistranded security cable to help prevent the theft
of a computer or another technology device. Sometimes called a Kensington lock. A lock that uses a multistranded security cable to help prevent the theft of a computer or another technology device. Sometimes called a Kensington lock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

USB lock

A

A lock used to secure USB cables into a computer and to securely plug empty USB ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

privacy screen

A

A screen placed over a monitor to limit visibility for people standing nearby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

key fob

A

A type of security token that generates access codes for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

entry control roster

A

A list of individuals or representatives who are authorized to enter a secured area that can be used with a variety of security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Active Directory Service

A

A Microsoft solution for managing users, computers,

and information access in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

login script

A

A script that Active Directory runs to make assigned resources available to a user who logs on to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

domain

A

A computer network or group of computer networks under the same
administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Group Policy

A

A set of rules and instructions defining what a user or group of users
can or cannot do when logged into a domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Organizational Unit (OU)

A

A logical group that can be used to organize users and

computers so that Group Policy Objects (GPOs) can be assigned to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

home folder

A

A file in which a user’s data and files are kept locally but are accessible to the network administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

folder redirection

A

A process that allows for the work done by an Organizational Unit (OU) to be saved on a common folder in the domain, as directed by the administrator instead of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

software token

A

Software security information used for authentication; generally
stored on a device. Can be generated by an app such as Google Authenticator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

mobile device management (MDM)

A

A way to manage the mobile devices within
an enterprise. For example, can ensure that all mobile users on the network have
updated security files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MAC address

A

Sometimes known as a physical address, a unique identification address for any device that has a network adapter and that consists of six two-digit hexadecimal numbers. For example, a typical PC MAC address is
FA-15-B7-89-6C-24.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

whitelisting

A

The practice of providing network access to only certain devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MAC address filtering

A

A method of securing networks by allowing only devices with known MAC addresses into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

MAC address cloning

A

The process of using software to change the MAC address of a network device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

certificate

A

A means of identifying a software publisher to ensure that it is
legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
antivirus/anti-malware software
Software designed to thwart virus and malware | attacks
26
firewall
A hardware appliance or software application that protects a computer from unwanted intrusion
27
two-way firewall
A firewall that can be used to protect against both inbound and outbound unauthorized traffic and threats.
28
authentication
The process of verifying user identity
29
multifactor authentication
A security system that uses two or more authentication methods and is far more secure than single-factor authentication. An example of this would be a person using a digital code from a fob and typing a username and password to gain access to a system.
30
directory permissions
A term used in macOS and Linux for the access levels a user has to a directory (folder) and individual files
31
file and folder permissions
A term used in Windows systems for configuring a | user’s access levels to a directory (folder) and individual files
32
virtual private network (VPN)
A private and secure network connection that is | carried by an insecure public network, such as the Internet.
33
data loss/leakage prevention (DLP)
The process of preventing confidential information from being viewed or stolen by unauthorized parties.
34
access control list
A list of permissions or restriction rules for access to an object such as a file or folder
35
email filtering
A method used to organize email into folders automatically. From a security standpoint, the most important function is the blocking of spam and potentially dangerous messages.
36
principle of least privilege
A security method whereby a user should have access | only to what is required to do his or her job and no more.
37
Wired Equivalent Privacy (WEP)
the oldest and weakest WiFi encryption standard. With WEP, all network devices must use the same WEP key and encryption strength.
38
WiFi Protected Access (WPA)
A security standard for WiFi networks that replaced WEP.
39
Temporal Key Integrity Protocol (TKIP)
A security protocol used in the WPA wireless networking standard.
40
Advanced Encryption Standard (AES)
A protocol that is similar to TKIP but more secure and that is used with the WPA2 wireless encryption standard.
41
single-factor authentication
Basic username and password access to a computer or network.
42
multifactor authentication
A security system that uses two or more authentication methods and is far more secure than single-factor authentication. An example of this would be a person using a digital code from a fob and typing a username and password to gain access to a system.
43
Remote Authentication Dial-In User Service (RADIUS)
Software and a protocol that allows remote authentication via a central server.
44
Terminal Access Controller Access Control System (TACACS)
An authentication protocol that allows a remote access server to verify a user by communicating with an authentication server.
45
ransomware
A virus that takes over a computer or network until a ransom is paid
46
Trojan
A malware program disguised as a “gift” (such as a popular video or website link) in order to trick the user into downloading the virus
47
keylogger
A hardware device or a software program (often a virus) that can track keystrokes and can capture usernames and passwords of unwitting users
48
rootkit
A set of hacking tools that finds its way deep into a computer’s operating system or applications and sets up shop to take over the computer
49
virus
A generic term for any malicious software that can spread to other computers and cause trouble
50
botnet
A network of computers infected by a hacker virus that uses the infected machines to work together to cause trouble, such as sending denial of service attacks or spreading spam
51
worm
A type of virus that is able to self-replicate on computers and push itself out to other computers.
52
spyware
Software that spies on system activities and transmits details of web searches or other activities to remote computers.
53
Recovery Console
A Windows tool that allows a user to reset a PC or boot from a recovery disk
54
acceptable use policy (AUP)
A company’s policy for employees pertaining to user safety, security procedures, and computer best practices within a company. The policy is designed to keep the network safe.
55
Domain Name Service (DNS)
a service that translates domain names into IP | addresses. DNS uses port 53
56
social engineering
A type of attack in which hackers trick users into providing passwords or other sensitive information.
57
phishing
The process of creating bogus websites or sending fraudulent emails in an attempt to trick users into providing personal, bank, or credit card information
58
spear phishing
The process of sending spoof messages that appear to come from an internal source requesting confidential information, such as payroll or tax information
59
impersonation
A type of social engineering similar to phishing in which a hacker sends an email pretending to be someone the victim trusts.
60
shoulder surfing
Attempting to view physical documents on a user’s desk or electronic documents displayed on a monitor by looking over the user’s shoulder
61
tailgating
A process in which an unauthorized person attempts to accompany an authorized person into a secure area by following closely and grabbing the door before it shuts
62
dumpster diving
The process of going through the trash, seeking information about a network or a person with access to the network.
63
denial of service (DoS)
the perpetrator uses one or computer to disrupt the target computer’s access to the Internet
64
distributed denial of service (DDoS)
the perpetrator uses multiple computers to disrupt the target computer’s access to the Internet
65
zero day
A cyber threat described as the time between when a software vulnerability is discovered and when a patch is issued by the developers. Hackers may exploit this window
66
man-in-the-middle (MiTM)
An attack in which the attacker intercepts a connection while fooling the endpoints into thinking they are communicating directly with each other.
67
brute force attack
A method of cracking passwords by calculating and using every possible combination of characters until the correct password is discovered
68
dictionary attack
An attempt to crack passwords by trying all the words in a list, such as a dictionary. A simple list might include commonly used passwords such as 12345678 and password
69
rainbow table
A table that is used in an attack in much the same manner as a brute-force attack but that is more mathematically sophisticated and takes less time
70
spoofing
A general term for malware attacks that purport to come from a trustworthy source.
71
noncompliant systems
Systems that are tagged by a configuration manager application (for example, Microsoft’s System Center Configuration Manager) for not having the most up-to-date security patches installed.
72
zombie
A computer on the Internet that has been taken over by a hostile program so it can be used for malware distribution or distributed denial of service (DDoS) or other attacks without notification to the normal users of the computer.
73
access control
The process of restricting the level of access to files or folders on an individual user basis.
74
New Technology File System (NTFS)
the native secure file | system of Windows 7/8/8.1/10
75
file attributes
Data used in Windows to indicate how files can be treated. Can be used to specify which files should be backed up, which should be hidden from the normal GUI or command line file listings, whether a file is compressed or encrypted, and for other functions, depending upon the operating system.
76
local shares
Files or folders shared locally in Windows.
77
administrative shares
Files or folders shared across networks in Windows
78
system files and folders
Files and folders with the system(s) attribute that are | normally not displayed in File Explorer to help protect them from deletion.
79
Single Sign-on (SSO)
The use of a single password to authenticate to multiple apps in an organization requiring authentication
80
BitLocker
Full disk encryption software by Microsoft that can encrypt the entire disk, which, after completed, is transparent to the user
81
Trusted Platform Module (TPM)
A chip used by Windows editions that support the BitLocker full-disk encryption feature to protect the contents of any specified drive (Windows 7/8/8.1/10).
82
BitLocker To Go
BitLocker functionality extended to removable drives.
83
Encrypting File System (EFS)
A feature used to protect sensitive data files and | temporary files through encryption that can be applied to individual files or folders.
84
passcode locking
The process of setting a passcode that opens a locked screen.
85
remote wipe
A program that can be initiated from a desktop computer to delete all the contents of a remote mobile device that has been lost or stolen
86
locator application
An application/service such as Android Device Manager, Lookout for iOS or Android, or Find My iPhone, that a user can use track down a lost device.
87
remote backup application
An application, often provided as a service, that backs up data to a remote site (often the cloud) to provide duplication away from the network servers.
88
patching/OS updates
Updates that protect mobile devices from the latest vulnerabilities and threats. By default, the user is notified automatically about available updates on Android and iOS-based devices.
89
biometric authentication
The use of physical biological identification, usually fingerprints, retina, or facial recognition, as part of the authentication process.
90
full device encryption
The process of encrypting an entire device, as opposed to encrypting a file on a device
91
authenticator application
An application used to receive or generate authentication codes for one or more apps or services.
92
bring your own device (BYOD)
A policy that allows users to join the local network using their personal devices.
93
overwrite
A disk maintenance program that includes options to overwrite a hard disk’s or solid-state drives (SSD’s) data area with zeros.
94
drive wipe
The process of ensuring the complete destruction of retrievable data on a storage device, which is overwritten with a program that meets or exceeds recognized data-destruction standards
95
service set identifier (SSID)
The advertised name of a local network that is broadcast to potential users in range and enables users to find and join the local (usually wireless) network.
96
Default service set identifier (SSID)
the SSID on the router when shipped to customers. Best security practices include changing the default SSID and password
97
Network Address Translation (NAT)
the process of modifying IP addresses as information crosses a router.
98
port forwarding
A method of allowing inbound traffic on a particular TCP or UDP port or range to go to a particular IP address rather than to all devices on a network. Used to forward external visitors through the router to a specific computer. Instead of opening up the entire LAN, port forwarding directs particular traffic where you want it to go