Chapter 21: Security Flashcards
_______ is any type of software that is used to disrupt computers and gain unauthorized access to systems, networks, and data
malware
_______ is a software that spies on system activities and transits details of web searches and other activities to remove computers
spyware
A ______ is a program that infects files in a operating systems by rewriting those files so that they do what the programmer wants
virus
______ can self replicate and no user intervention is required
worms
_______ are malware programs disguised as popular videos or website links that trap keystrokes or transmit sensitive information
trojan horses
______ are a concealment method used by many types of malware to prevent detection by normal anivirus and anti malware programs
Rootkits
________ uses malware to encrypt the targeted computer’s files.
ransomware
A __________ takes advantage of a not yet patched security flaw in an operating system or app, frequently on the same day the vulnerability has become known.
zero day attack
A ________ is a computer on the Internet that has been taken over by a hostile program so it can be used for malware distribution, distributed denial of service (DDoS) or other attacks without notification to the normal users of the computer
Zombie/Botnet
________ is a method of cracking passwords by calculating and using every possible combination of characters until the correct password is discovered
Brute forcing
___________ attempt to crack passwords by trying all the words in a list
dictionary attacks
_________ are systems that are tagged by a configuration manager application because they do not have the most up to date security patches installed
non compliant systems
_______ occurs when an unauthorized person attempts to accompany an authorized person into a secure area by following them closely and grabbing the door before it shuts.
tailgating
If an authorized persona knownlying participates in tailgating, this is called _________
piggybacking
A ________ attack involves the attacker intercepting a connection while fooling the endpoints into thinking they are communicating directly with each other
man in the middle (MiTM)
The sending of unauthorized messages over a Bluetooth connection to a device
Bluejacking
Provides unauthorized access from a wireless device through a Bluetooth connection
Bluesnarfing
Creates unauthorized backdoor access to connect a Bluetooth device back to the attacker
Bluebugging
What are the 4 factors of preventing security breaches
- physical security
- digital security
- user education/ acceptable use policy (AUP)
- principle of least privilege
can be used to secure laptops and other equipment that include the Kensington security lock port
cable locks
_____ refers to the use of biological information, such as human body characteristics, to authenticate a potential user of a secure area.
Biometrics
What is the most common type of biometric security system for PCs?
fingerprint based
an ID badge that uses radio frequency identification technology that store information about the user
RFID badge
What is the 2 phase authentication protocol for key fobs as security devices?
- the user logs into the key fob with a PIN
- The user logs into the system or restricted area using a randomly generated access code that refreshes every 30 to 60 seconds
_______ is the term used in OS X and Linux for configuring the access levels a user has to a directory (folder) and individual files
Directory permissions
In Windows, the equivalent term for directory permissions is _________
file and folder permissions
What is the most common type of VPNs?
PPTP (uses 128 bit encryption) and L2TP/IPsec (combined; uses 256 bit encryption)
_______ refers to the prevention of confidential information from being viewed or stolen by unauthorized parties by observing and analyzing unusual patterns of data access, email and instant messaging
DLP (Data loss/leakage prevention)
______ refers to preventing specified UDP or TCP ports form being used by a service, application, specific device, or all devices with a firewall appliance or software firewall
disabling ports
________ are included in software and used to identify the publisher; most OS display warning messages when an app without one is being installed; some block installation of an app without one
digital certificates