Chapter 21: Security Flashcards
_______ is any type of software that is used to disrupt computers and gain unauthorized access to systems, networks, and data
malware
_______ is a software that spies on system activities and transits details of web searches and other activities to remove computers
spyware
A ______ is a program that infects files in a operating systems by rewriting those files so that they do what the programmer wants
virus
______ can self replicate and no user intervention is required
worms
_______ are malware programs disguised as popular videos or website links that trap keystrokes or transmit sensitive information
trojan horses
______ are a concealment method used by many types of malware to prevent detection by normal anivirus and anti malware programs
Rootkits
________ uses malware to encrypt the targeted computer’s files.
ransomware
A __________ takes advantage of a not yet patched security flaw in an operating system or app, frequently on the same day the vulnerability has become known.
zero day attack
A ________ is a computer on the Internet that has been taken over by a hostile program so it can be used for malware distribution, distributed denial of service (DDoS) or other attacks without notification to the normal users of the computer
Zombie/Botnet
________ is a method of cracking passwords by calculating and using every possible combination of characters until the correct password is discovered
Brute forcing
___________ attempt to crack passwords by trying all the words in a list
dictionary attacks
_________ are systems that are tagged by a configuration manager application because they do not have the most up to date security patches installed
non compliant systems
_______ occurs when an unauthorized person attempts to accompany an authorized person into a secure area by following them closely and grabbing the door before it shuts.
tailgating
If an authorized persona knownlying participates in tailgating, this is called _________
piggybacking
A ________ attack involves the attacker intercepting a connection while fooling the endpoints into thinking they are communicating directly with each other
man in the middle (MiTM)
The sending of unauthorized messages over a Bluetooth connection to a device
Bluejacking
Provides unauthorized access from a wireless device through a Bluetooth connection
Bluesnarfing
Creates unauthorized backdoor access to connect a Bluetooth device back to the attacker
Bluebugging
What are the 4 factors of preventing security breaches
- physical security
- digital security
- user education/ acceptable use policy (AUP)
- principle of least privilege
can be used to secure laptops and other equipment that include the Kensington security lock port
cable locks
_____ refers to the use of biological information, such as human body characteristics, to authenticate a potential user of a secure area.
Biometrics
What is the most common type of biometric security system for PCs?
fingerprint based
an ID badge that uses radio frequency identification technology that store information about the user
RFID badge
What is the 2 phase authentication protocol for key fobs as security devices?
- the user logs into the key fob with a PIN
- The user logs into the system or restricted area using a randomly generated access code that refreshes every 30 to 60 seconds