Securing Devices and Data Flashcards
Allows encryption of individual drives and folders on any NTFS volume. It is included with Business/Professional/Enterprise/Ultimate editions of Windows, as well as all editions of Windows Server
EFS: Encrypting File System
Encrypts entire NTFS volumes, including the system drive. It is available on Enterprise and Ultimate Editions of Windows Vista and 7, Pro and Enterprise versions of Windows 8 and later, and all editions of Windows Server 2008 and later.
BitLocker
Used to protect removable drives, such as USB flash drives. It can encrypt drives formatted as FAT16, FAT32, and exFAT as well as NTFS. It is included in Windows 7 and later systems which include BitLocker
BitLocker-To-Go
Three ways BitLocker can authenticate:
Transparent operation mode
User authentication mode
USB key mode
Allows the user to start up the computer and log into Windows as normal
Transparent operation mode
Prompts the user for a PIN or password on startup
User authentication mode
Stores a startup key on a USB device
USB key mode
Use powerful electromagnets to destroy all data on magnetic media like tapes and hard drives, but not optical or flash storage
Degaussers
To securely delete files on an active computer, install a secure deletion program such as:
SDlelete, CCleaner, Eraser, and File Shredder.
Writes zeroes to the entire drive and restores it to its newly installed configuration
low-level format
Data destruction utilities
DBAN, HDShredder, and KillDisk
An entire volume encryption feature included with Windows Vista and Windows 7 Ultimate and Enterprise editions; uses a Trusted Platform Module (TPM) microchip; can encrypt the NTFS volumes including the system volume; requires a smaller boot volume with at least 100 MB of free space in order to perform the decryption routines; and is compatible with EFS
Bitlocker Drive Encryption
A type of security software used by an IT department to monitor, manage, and secure employees’ mobile devices.
Mobile device management (MDM)
Policy governs a user-owned device on the corporate network
BYOD
Swing a finger across the screen, or a certain part of the screen, to unlock.
Swipe Screen
Unlock the device with a numeric PIN.
Passcode
Unlock the device by drawing a predefined structure over points on the screen.
Pattern
A strong authentication term of identification which includes mixed cases and special characters.
Password
A camera with infrared (IR) sensitivity is effective for unlocking the device under varying light conditions.
Face
Used to force stop an app from within the operating system, or uninstall and reinstall it
App control features
Used to verify signal problems and check the signal strength or connection speed problems
Wireless analyzer
Used to monitor the system or actively scan for signs of malware
Antimalware
Used to rearrange the device to a freshly installed state, deleting user data, installed apps, and, any installed malware
Factory resets
Used to notice unusual activities in the device even if they’re not strictly malware
App scanner