Chapter 27 - Securing Computers Flashcards
Man-in-the-Middle threat
a threat coming between a client and a server. Encryption helps protect against this
Spoofing threat
taking on the likeness of something else such as email. Secured connections protect against this.
Dos threat is what?
Denial of Service(DoS). Bad request coming into a server causes it to stall.
DDos threat is what?
Distributed Denial of Service(DDoS). Installing malware onto a bunch of computers turning them into Zombies and then the Zombies send thousand of bad request to bring down a server.
Zero Day
A new version of a threat that no one has seen before.
Renamed system files
Are using phishy emails or request to rename files.
Denied of things that you have access to.
Is another phishy sign of a security threat.
Disappearing Files
Is another phishy sign of a security threat.
Three Levels of Physical Security
- Perimeter Security. 2. Locked Rooms. 3. Individual devices.
Hash
Is your password turned into a string of letters and numbers using an encryption algorithm
Brute Force
Rarely used to crack a password.
Dictionary Attack
Using a list of known or commonly used passwords to crack passwords.
Rainbow table
like dictionary but use tables of commonly used passwords and commonly used numbers in passwords to crack a password.
Password practices/advice
- Make a long password using numbers, upper and lower case letters and special characters. 2. Password expiration change your password often like 30 to 90 days. 3. Screensavers. 4. Passwords for lock screens. 5. BIOS/UEFI passwords. 6. Passwords on everything. Use Multifactor Authentication.
Virus
is a very old term for malware.
worm
first gen of malware that propagate via networking
Malware
Pretty much all malware is a worm. Infestations manifest as browser redirection, application crashes, update failures, and more.
Trojan Horse
Masquerades as benign programs, but carry a payload for later.