Social Engineering and Other Foes Flashcards

(36 cards)

1
Q

administrative control

A

A control implemented through administrative policies or procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cable lock

A

A physical security deterrent used to protect a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cold aisles

A

Server room aisles that blow cold air from the floor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

compensating controls

A

Gap controls that fill in the coverage between the other types of vulnerability mitigation techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

control

A

Processes or actions used to respond to situations or events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data disposal

A

Getting rid of/destroying media no longer needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

detective control

A

Controls that are intended to identify and characterize an incident in progress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

dumpster diving

A

Looking through trash for clues, often in the form of paper scraps, to find user passwords and other information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Faraday cage

A

An electronically conductive wire mesh or other conductor woven into a ‘cage’ that surrounds a room and prevents electromagnetic signals from entering or leaving the room through the walls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

fire suppression

A

The act of stopping a fire and preventing it from spreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hoax

A

Typically, an email message warning of something that isn’t true, such as the outbreak of a new virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hot aisles

A

A server room aisle that removes hot air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

information classification

A

The process of determining what information is accessible, to what parties, and for what purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

mantrap

A

A device, such as a small room, that limits access to one or a few individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PASS method

A

The correct method of extinguishing a fire with an extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PASS

A

Pull
Aim
Squeeze
Sweep

17
Q

perimeter security

A

Security set up on the outside of the network or server to protect it

18
Q

Personal Identity Verification (PIV)

A

Card required of federal employees and contractors to gain access to government resources

19
Q

PIV

A

Personal Identity Verification

20
Q

personally identifiable information (PII)

A

Information that can be uniquely used to identify, contact, or locate a single person

21
Q

PII

A

personally identifiable information

22
Q

phishing

A

A form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request

23
Q

physical controls

A

Controls and countermeasures of a tangible nature intended to minimize intrusions

24
Q

preventive controls

A

Controls intended to prevent attacks or intrusions

25
privacy
A state of security in which information isn't seen by unauthorized parties without the express permission of the party involved
26
privacy filters
Screens that restrict viewing of monitors to only those sitting in front of them
27
PTZ
Cameras that can pan, tilt, and zoom
28
restricted information
Information that isn't made available to all and to which access is granted based on some criteria
29
shoulder sniffing
Watching someone when they enter their username, password, or sensitive data
30
social engineering
An attack that uses others by deceiving them; targets and manipulates people
31
spear phishing
A form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party
32
tailgating
Following someone through an entry point
33
technical controls
Controls that rely on technology
34
vishing
Combining phishing with Voice over IP (VOIP)
35
wetware
Term used in conjunction with social engineering; refers to the idea that human thoughts are analogous to computers
36
whaling
Phishing only large accounts