Chapter 17 Flashcards
The for common prevention methods are?p799
physical security
digital security
user education
principle of least privilege
bag of elements that can be added to an environment to aid in securing it.p799
Physical security
being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device.p800
Tailgating
include fingerprint/palm/hand scanners, retinal scanners, and soon, possibly, DNA scanners. p801
Biometrics
any form of identification intended to differentiate the holder from everyone else. This can be as simple as a name badge or photo ID. p801
Badges
They are security devices that you carry with you; they display a randomly generated code that you can then use for authentication.p801
Key Fobs
type of badge or card that gives you access to resources, including buildings, parking lots, and computers. p801
RFID Badges
are anything that a user must have on them to access network resources and are often associated with devices that enable the user to generate a one-time password authenticating their identity. p802
RSA Tokens
r film or glass add-ons that are placed over a monitor or laptop screen to prevent the data on the screen from being readable when viewed from the sides.p802
Privacy Filters
As the name implies, matches are made based upon identification of the blood vessels in an individual’s retina. p802
Retinal
keeping harmful data and malware out as well as on authorization and permissions. p802
Digital Security
application that is installed on a system to protect it and to scan for viruses as well as worms and Trojan horses.p802
Antivirus Software
There are different types of firewalls, and they can be either stand-alone systems or included in devices such as what? p803
routers or servers.
passes or blocks traffic to specific addresses based on the type of application and the port used. p804
Packet filter firewalls
are used to process requests from an outside network; the proxy firewall examines the data and makes rule-based decisions about whether the request should be forwarded or refused. p804
Proxy firewalls