Chapter 27 - Securing Computers Flashcards
Man-in-the-Middle threat
a threat coming between a client and a server. Encryption helps protect against this
Spoofing threat
taking on the likeness of something else such as email. Secured connections protect against this.
Dos threat is what?
Denial of Service(DoS). Bad request coming into a server causes it to stall.
DDos threat is what?
Distributed Denial of Service(DDoS). Installing malware onto a bunch of computers turning them into Zombies and then the Zombies send thousand of bad request to bring down a server.
Zero Day
A new version of a threat that no one has seen before.
Renamed system files
Are using phishy emails or request to rename files.
Denied of things that you have access to.
Is another phishy sign of a security threat.
Disappearing Files
Is another phishy sign of a security threat.
Three Levels of Physical Security
- Perimeter Security. 2. Locked Rooms. 3. Individual devices.
Hash
Is your password turned into a string of letters and numbers using an encryption algorithm
Brute Force
Rarely used to crack a password.
Dictionary Attack
Using a list of known or commonly used passwords to crack passwords.
Rainbow table
like dictionary but use tables of commonly used passwords and commonly used numbers in passwords to crack a password.
Password practices/advice
- Make a long password using numbers, upper and lower case letters and special characters. 2. Password expiration change your password often like 30 to 90 days. 3. Screensavers. 4. Passwords for lock screens. 5. BIOS/UEFI passwords. 6. Passwords on everything. Use Multifactor Authentication.
Virus
is a very old term for malware.
worm
first gen of malware that propagate via networking
Malware
Pretty much all malware is a worm. Infestations manifest as browser redirection, application crashes, update failures, and more.
Trojan Horse
Masquerades as benign programs, but carry a payload for later.
Rootkit
Tries to hide in the boot section of your hard drive to find from the OS.
Ransom ware
One of the biggest issues of malware today. Attacks or locks down your system in exchange for money.
Rogue Antivirus
a virus downloaded from an location offering antivirus
Botnet
a bunch of zombified computers, that are under the control of someone else.
Keylogger
Recording a users a key logs or key strokes.
Spyware
a piece of malware that’s spying on your system.
Pop-ups
bad pop-ups that pop-up as a sperate window.
Browser redirection
Getting routed to a different website when trying to go to a specific website.
Security Alerts
OS security that notifies you of malware activity.
Application Crashes
Another common issue of malware
OS update failure
Updates of your OS fail. Malware preventing you to perform updates.
Spam
Phishy emails from known email addresses. Like your getting phishy emails from your friends. Or you friends are getting phishy emails from you.
Hijacked email
When your email is sending out phishy emails that you aren’t actually sending out.
Automated Replies
Automated replies that sound phishy
Best Practices for dealing with Malware
- No such thing as an antivirus program term is anti-malware. 2.
Recovery Console.
Have a backup file. End-user Education, tech users what to look for.
software firewall.
the Host/built in firewall.
Secure DNS
Use a secure DNS to help prevent big companies taking your data.
Encrypt your DNS request
Very secure DNS. configuring a public DNS server.
Disable system restore.
Windows restores system restore.
Phishing
could be email, a website
EULA
describes what users can do with licensed software
DRM
controls what users can do with some content
Open-source
software enables users to change or modify the software.
Incident Response
- Know your responsibility. 2. Identify the problem. 3. Keep chain of custody.
Identify the problem
Report through the proper channels. Data/Device preservation. Use of documentation. Document changes
Keep chain of custody
Tracking evidence, Document process.
MSDS stands for what?
Materials Safety Data Sheet(MSDS).
Temperature and Humidity Levels
Good to keep computer in good cool environments. And need proper ventilation.