Module 2 Flashcards
:Users\Administrator› gpedit
Необхідно ввести у віндовс терміналі щоб відкрити налаштування комп’ютера та користувача
MFA
Multifactor authentication is quickly becoming the industry standard for effective security.
SSO
Single sign-on verifies users for connected accounts or apps, so they only have to log in once.
Password cracking
- Brute force attacks submit as many passwords as possible
- Dictionary attacks use words pulled from dictionaries or newspapers
- Rainbow attacks use words from an original password hash
Hashing
When an algorithm transforms an input string (like your password) into a smaller, fixed-length output string (hash)
SFA
Single-factor authentication
SFA means you only enter one credential to log in.
Access control
Access control prevents unauthorized viewing, modification, or copying of data.
Authorization
Authorization is when you have permission to access a location or do an action.
Authentication
Authentication is the act of confirming the identity of a user.
Hardening
Hardening is the process of securing a device to minimize vulnerabilities.
Harden devices by:
* Disabling unneeded features
* Updating firmware, 0S, and software
* Using firewalls, VPN, and anti-malware
Firmware
Firmware is software that tells hardware how to behave.
- BIOS passwords / firmware passwords
- Secure boot
- Trusted Platform Module (TPM)
- Drive encryption
BIOS passwords / firmware passwords
BIOS passwords / firmware passwords
The Basic Input Output System (BIOS):
* Boots up Windows and Linux PCs
* Runs hardware checks
* Starts the OS
口
The OS won’t start without the BIOS password or if the hardware checks find a problem.
Secure boot
UEFI
Unified Extensible Firmware Interface (UEFI) is newer and more advanced boot firmware than BIOS.
- Secure boot is a feature of UEFI.
- Secure boot confirms an OS manufacturer’s digital signature, which prevents malware from taking control during bootup.
TPM
Trusted Platform Module (TPM)
A TPM is a chip that stores and manages encryption keys.
TPM chips won’t start a device or unencrypt data if tampering is detected.
Drive encryption
Drive encryption scrambles a drive’s data so it is unreadable.