6b - Further hardware/software measures Flashcards
What is principle of least privilege
Users have the minimum network access to perform their job role
What is a network audit
A log of how users interact with a network, including when and where
what is trusted computing?
trusted computing uses the TPM module to store encryption keys and other data which is inaccessible to the rest of the system
what is meant by remote validation
remote validation is used to validate specific pieces of data on server, for example just an email address
why are WLAN more susceptible to attack
WLAN connections to not require access to physical hardware connections
what is mac filtering
MAC filtering means certain devices can be restricted from network access by their permanent mac address. it can be spoofed
what does WEP stand for
wireless equivalent privacy
list some ways of ensuring security during network and system design
firewalls, content inspection systems, network compartmentalisation, principle of least privilege