Chapter 7 Security Key Terms Flashcards
mantrap
An area with two locking doors.
Radio-frequency identification (RFID) technology
a technology that consists of an RFID tag that can broadcast information about an item, as well as an RFID reader to accept the broadcast information and deliver it to a computer system for use
smart card
A credit card–sized card that contains stored information and might also contain a simple microprocessor or an RFID chip
biometric security
The use of a person’s biological information, such as fingerprints, retina scans, or facial recognition, to authenticate a potential user of a secure area.
token
A device, also known as a security token, that owners carry to authorize access.
cable lock
A lock that uses a multistranded security cable to help prevent the theft
of a computer or another technology device. Sometimes called a Kensington lock. A lock that uses a multistranded security cable to help prevent the theft of a computer or another technology device. Sometimes called a Kensington lock.
USB lock
A lock used to secure USB cables into a computer and to securely plug empty USB ports.
privacy screen
A screen placed over a monitor to limit visibility for people standing nearby
key fob
A type of security token that generates access codes for authentication
entry control roster
A list of individuals or representatives who are authorized to enter a secured area that can be used with a variety of security systems.
Active Directory Service
A Microsoft solution for managing users, computers,
and information access in a network.
login script
A script that Active Directory runs to make assigned resources available to a user who logs on to a network.
domain
A computer network or group of computer networks under the same
administration
Group Policy
A set of rules and instructions defining what a user or group of users
can or cannot do when logged into a domain.
Organizational Unit (OU)
A logical group that can be used to organize users and
computers so that Group Policy Objects (GPOs) can be assigned to them
home folder
A file in which a user’s data and files are kept locally but are accessible to the network administrator.
folder redirection
A process that allows for the work done by an Organizational Unit (OU) to be saved on a common folder in the domain, as directed by the administrator instead of the user.
software token
Software security information used for authentication; generally
stored on a device. Can be generated by an app such as Google Authenticator.
mobile device management (MDM)
A way to manage the mobile devices within
an enterprise. For example, can ensure that all mobile users on the network have
updated security files
MAC address
Sometimes known as a physical address, a unique identification address for any device that has a network adapter and that consists of six two-digit hexadecimal numbers. For example, a typical PC MAC address is
FA-15-B7-89-6C-24.
whitelisting
The practice of providing network access to only certain devices.
MAC address filtering
A method of securing networks by allowing only devices with known MAC addresses into the network.
MAC address cloning
The process of using software to change the MAC address of a network device.
certificate
A means of identifying a software publisher to ensure that it is
legitimate
antivirus/anti-malware software
Software designed to thwart virus and malware
attacks
firewall
A hardware appliance or software application that protects a computer
from unwanted intrusion
two-way firewall
A firewall that can be used to protect against both inbound and outbound unauthorized traffic and threats.
authentication
The process of verifying user identity
multifactor authentication
A security system that uses two or more authentication methods and is far more secure than single-factor authentication. An example
of this would be a person using a digital code from a fob and typing a username and password to gain access to a system.
directory permissions
A term used in macOS and Linux for the access levels a user has to a directory (folder) and individual files
file and folder permissions
A term used in Windows systems for configuring a
user’s access levels to a directory (folder) and individual files
virtual private network (VPN)
A private and secure network connection that is
carried by an insecure public network, such as the Internet.
data loss/leakage prevention (DLP)
The process of preventing confidential information from being viewed or stolen by unauthorized parties.
access control list
A list of permissions or restriction rules for access to an object such as a file or folder
email filtering
A method used to organize email into folders automatically. From
a security standpoint, the most important function is the blocking of spam and
potentially dangerous messages.
principle of least privilege
A security method whereby a user should have access
only to what is required to do his or her job and no more.
Wired Equivalent Privacy (WEP)
the oldest and weakest WiFi encryption standard. With WEP, all network devices must use the same WEP key and encryption
strength.
WiFi Protected Access (WPA)
A security standard for WiFi networks that replaced WEP.
Temporal Key Integrity Protocol (TKIP)
A security protocol used in the WPA wireless networking standard.