Social Engineering and Other Foes Flashcards

1
Q

administrative control

A

A control implemented through administrative policies or procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cable lock

A

A physical security deterrent used to protect a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cold aisles

A

Server room aisles that blow cold air from the floor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

compensating controls

A

Gap controls that fill in the coverage between the other types of vulnerability mitigation techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

control

A

Processes or actions used to respond to situations or events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data disposal

A

Getting rid of/destroying media no longer needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

detective control

A

Controls that are intended to identify and characterize an incident in progress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

dumpster diving

A

Looking through trash for clues, often in the form of paper scraps, to find user passwords and other information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Faraday cage

A

An electronically conductive wire mesh or other conductor woven into a ‘cage’ that surrounds a room and prevents electromagnetic signals from entering or leaving the room through the walls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

fire suppression

A

The act of stopping a fire and preventing it from spreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hoax

A

Typically, an email message warning of something that isn’t true, such as the outbreak of a new virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hot aisles

A

A server room aisle that removes hot air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

information classification

A

The process of determining what information is accessible, to what parties, and for what purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

mantrap

A

A device, such as a small room, that limits access to one or a few individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PASS method

A

The correct method of extinguishing a fire with an extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PASS

A

Pull
Aim
Squeeze
Sweep

17
Q

perimeter security

A

Security set up on the outside of the network or server to protect it

18
Q

Personal Identity Verification (PIV)

A

Card required of federal employees and contractors to gain access to government resources

19
Q

PIV

A

Personal Identity Verification

20
Q

personally identifiable information (PII)

A

Information that can be uniquely used to identify, contact, or locate a single person

21
Q

PII

A

personally identifiable information

22
Q

phishing

A

A form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request

23
Q

physical controls

A

Controls and countermeasures of a tangible nature intended to minimize intrusions

24
Q

preventive controls

A

Controls intended to prevent attacks or intrusions

25
Q

privacy

A

A state of security in which information isn’t seen by unauthorized parties without the express permission of the party involved

26
Q

privacy filters

A

Screens that restrict viewing of monitors to only those sitting in front of them

27
Q

PTZ

A

Cameras that can pan, tilt, and zoom

28
Q

restricted information

A

Information that isn’t made available to all and to which access is granted based on some criteria

29
Q

shoulder sniffing

A

Watching someone when they enter their username, password, or sensitive data

30
Q

social engineering

A

An attack that uses others by deceiving them; targets and manipulates people

31
Q

spear phishing

A

A form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party

32
Q

tailgating

A

Following someone through an entry point

33
Q

technical controls

A

Controls that rely on technology

34
Q

vishing

A

Combining phishing with Voice over IP (VOIP)

35
Q

wetware

A

Term used in conjunction with social engineering; refers to the idea that human thoughts are analogous to computers

36
Q

whaling

A

Phishing only large accounts