Cisco 3 Flashcards
Whether it is a software firewall or a hardware firewall on a router, the firewall should be turned on and updated to prevent hackers from accessing your personal or company data.
Keep the Firewall On
Malicious software, such as viruses, Trojan horses, worms, ransomware and spyware, are installed on your computing devices without your permission, in order to gain access to your computer and your data.
Use Antivirus and Antispyware
Hackers are always trying to take advantage of vulnerabilities in your operating systems and your web browsers.
Manage Your Operating System and Browser
Your computing devices, whether they are PCs, laptops, tablets, or smartphones, should be password protected to prevent unauthorized access.
Protect All Your Devices
Below is a short list of steps you can take to protect your computing devices from intrusion:
Protect Your Computing Devices
- Keep the Firewall On
- Use Antivirus and Antispyware
- Manage Your Operating System and Browser
- Protect All Your Devices
October 2017, a security flaw in the WPA2 protocol was discovered. This flaw allows an intruder to break the encryption between the wireless router and the wireless client, and allow the intruder to access and manipulate the network traffic.
Key Reinstallation Attacks (KRACK)
Tips for choosing a good password
- Do not use dictionary words or names in any languages
- Do not use common misspellings of dictionary words
- Do not use computer names or account names
- If possible use special characters, such as ! @ # $ % ^ & * ( )
- Use a password with ten or more characters
the process of converting the information into a form where an unauthorized party cannot read it. Only a trusted, authorized person with the secret key or password can decrypt the data and access it in its original form
Encryption
Windows feature that can encrypt data.
Encrypting File System (EFS)
credit card, ATM card, phone, or fob
Two Factor Authentication
Physical object
open standard protocol that allows an end user’s credentials to access third party applications without exposing the user’s password
Open Authorization (OAuth)
fingerprint, palm print, as well as facial or voice recognition
Two Factor Authentication
Biometric scan
to add an extra layer of security for account
Two Factor Authentication
convenient way to communicate with each other quickly
Microsoft Internet Explorer
InPrivate