Chapter 17 Flashcards
The for common prevention methods are?p799
physical security
digital security
user education
principle of least privilege
bag of elements that can be added to an environment to aid in securing it.p799
Physical security
being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device.p800
Tailgating
include fingerprint/palm/hand scanners, retinal scanners, and soon, possibly, DNA scanners. p801
Biometrics
any form of identification intended to differentiate the holder from everyone else. This can be as simple as a name badge or photo ID. p801
Badges
They are security devices that you carry with you; they display a randomly generated code that you can then use for authentication.p801
Key Fobs
type of badge or card that gives you access to resources, including buildings, parking lots, and computers. p801
RFID Badges
are anything that a user must have on them to access network resources and are often associated with devices that enable the user to generate a one-time password authenticating their identity. p802
RSA Tokens
r film or glass add-ons that are placed over a monitor or laptop screen to prevent the data on the screen from being readable when viewed from the sides.p802
Privacy Filters
As the name implies, matches are made based upon identification of the blood vessels in an individual’s retina. p802
Retinal
keeping harmful data and malware out as well as on authorization and permissions. p802
Digital Security
application that is installed on a system to protect it and to scan for viruses as well as worms and Trojan horses.p802
Antivirus Software
There are different types of firewalls, and they can be either stand-alone systems or included in devices such as what? p803
routers or servers.
passes or blocks traffic to specific addresses based on the type of application and the port used. p804
Packet filter firewalls
are used to process requests from an outside network; the proxy firewall examines the data and makes rule-based decisions about whether the request should be forwarded or refused. p804
Proxy firewalls
referred to as stateful packet filtering. Most of the devices used in networks don’t keep track of how information is routed or used. After a packet is passed, the packet and path are forgotten. p805
Stateful inspection firewalls
(UDP)stands for what? p806
User Datagram Protocol (UDP)
(ICMP)stands for what? p806
Internet Control Message Protocol (ICMP)
a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. p809
Social Engineering
these uninvited intruders may damage the data on your hard disk, destroy your operating system, and possibly spread to other systems. p810
Malware
are software programs that have the ability to hide certain things from the operating system; they do so by obtaining (and retaining) administrative-level access.p810
Rootkits
social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. p810
Phishing
When you combine phishing with Voice over IP (VoIP), it becomes known as what?p811
vishing
Two other forms of phishing to be aware of are. p811
spear phishing and whaling,