Chapter 17 Flashcards
The for common prevention methods are?p799
physical security
digital security
user education
principle of least privilege
bag of elements that can be added to an environment to aid in securing it.p799
Physical security
being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device.p800
Tailgating
include fingerprint/palm/hand scanners, retinal scanners, and soon, possibly, DNA scanners. p801
Biometrics
any form of identification intended to differentiate the holder from everyone else. This can be as simple as a name badge or photo ID. p801
Badges
They are security devices that you carry with you; they display a randomly generated code that you can then use for authentication.p801
Key Fobs
type of badge or card that gives you access to resources, including buildings, parking lots, and computers. p801
RFID Badges
are anything that a user must have on them to access network resources and are often associated with devices that enable the user to generate a one-time password authenticating their identity. p802
RSA Tokens
r film or glass add-ons that are placed over a monitor or laptop screen to prevent the data on the screen from being readable when viewed from the sides.p802
Privacy Filters
As the name implies, matches are made based upon identification of the blood vessels in an individual’s retina. p802
Retinal
keeping harmful data and malware out as well as on authorization and permissions. p802
Digital Security
application that is installed on a system to protect it and to scan for viruses as well as worms and Trojan horses.p802
Antivirus Software
There are different types of firewalls, and they can be either stand-alone systems or included in devices such as what? p803
routers or servers.
passes or blocks traffic to specific addresses based on the type of application and the port used. p804
Packet filter firewalls
are used to process requests from an outside network; the proxy firewall examines the data and makes rule-based decisions about whether the request should be forwarded or refused. p804
Proxy firewalls
referred to as stateful packet filtering. Most of the devices used in networks don’t keep track of how information is routed or used. After a packet is passed, the packet and path are forgotten. p805
Stateful inspection firewalls
(UDP)stands for what? p806
User Datagram Protocol (UDP)
(ICMP)stands for what? p806
Internet Control Message Protocol (ICMP)
a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. p809
Social Engineering
these uninvited intruders may damage the data on your hard disk, destroy your operating system, and possibly spread to other systems. p810
Malware
are software programs that have the ability to hide certain things from the operating system; they do so by obtaining (and retaining) administrative-level access.p810
Rootkits
social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. p810
Phishing
When you combine phishing with Voice over IP (VoIP), it becomes known as what?p811
vishing
Two other forms of phishing to be aware of are. p811
spear phishing and whaling,
They can see you entering a password, typing in a credit card number, or entering any other pertinent information. The best defense against this type of attack is simply to survey your environment before entering personal data.p811
Shoulder Surfing
program monitors the user’s activity and responds by offering unsolicited pop-up advertisements (sometimes known as adware), gathers information about the user to pass on to marketers, or intercepts personal data such as credit card numbers.p811
Spyware
classified as polymorphic, stealth, retrovirus, multipartite, armored, companion, phage, and macro viruses. p812
Viruses
cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus.p814
Armored virus
attaches itself to legitimate programs and then creates a program with a different filename extension.p815
Companion virus
exploits the enhancements made to many application programs. Programmers can expand the capability of applications such as Microsoft Word and Excel.p815
Macro virus
attacks your system in multiple ways. It may attempt to infect your boot sector, infect all of your executable files, and destroy your application files.p815
Multipartite virus
alters other programs and databases. The virus infects all of these files. The only way to remove this virus is to reinstall the programs that are infected. p815
Phage virus
change form to avoid detection. These types of viruses attack your system, display a message on your computer, and delete files on your system.p816
Polymorphic virus
can directly attack your antivirus software and potentially destroy the virus definition database file. Destroying this information without your knowledge would leave you with a false sense of security.p816
Retrovirus
attempts to avoid detection by masking itself from applications. It may attach itself to the boot sector of the hard drive. p816
Stealth virus
different from a virus in that it can reproduce itself, it’s self-contained, and it doesn’t need a host application to be transported.p817
Worms
are programs that enter a system or network under the guise of another program.p818
Trojans
what are the seven workstation security best practices. p818
Set strong passwords Require passwords Restrict user permissions Change default usernames Disable the guest account Make the screensaver require a password Disable autorun functionality
Most vendors recommend that you use nonalphabetic characters such as _________in your password, and some go so far as to require it .p819
, $, and %