Module 5 Flashcards
Three types of users
Administrator
Guest
Standard User
Power User
System32 folder does what
contains windows system directory.
required to running everything….
Windows folder does what
contains windows software
single sign-on
Logging into other network resources when you log into the network so you aren’t prompted each time you attempt to access a network resource
physical security efforts
locked door shredding id badges rfid badge biometrics retinal scans privacy filter
Tailgating
Sneaking in as folks leave
physical destruction options
shredder
drill for HD
EMI
Electromagnetic Interference
Common for network interference
Not the same as ESD. Does not destroy HD data
ESD
Electrostatic discharge.
Could destroy an HD
degaussing tool
Degaussing involves applying a strong magnetic field to initialize the media (this is also referred
to as disk wiping). This process helps ensure that information doesn’t fall into the wrong hands.
Standard format
File allocation tables have been told the info is gone, and sector is free to write to. But the info is still there.
This as opposed to low level format.
Low Level Format
Best perfect way to delete data on a hard drive. Superior to standard format
Windows Defender
Built-in tool that looks for Malware behind the scenes.
Looks for specific signatures of files.
Not very powerful. Does not protect email, for example
Virus
Attaches itself to a program or a file that enables it to spread from computer to computer.
Almost all viruses are attached to an executable file, meaning someone must open/run/click on it for it to run and travel.
Worm
Can travel without human intervention.
Consumes memory, network bandwidth, etc.
Trojan Horse
programs that enter a system or network under the guise of another program.
A Trojan horse may be included as an attachment or as part of an installation program. The Trojan horse can create a back door or replace a valid program during installation
Evidence of Malware
Decreased system performance Disappearance of data Data modification Failure to launch OS or software High network activity Increase in file size Coworkers report suspicious behavior
Shoulder Rufing
Watching over someone’s shoulders to access info…
What windows account should you probably disable
Guest
SOHO
small office / home office
Some things to do to secure a SOHO
Change default user names / passwords Change SSID Set up wireless encryption Disable SSID broadcast Enable MAC filtering Antenna and Access Point placement to limit access Assign static IP addresses Disable ports
Dumpster diving
Companies normally generate a huge amount of paper, most of which eventually
winds up in dumpsters or recycle bins. Dumpsters may contain information that is highly
sensitive in nature (such as a password a user has written on a piece of paper because they
haven’t memorized it yet).
Rootkits
Rootkits are software programs that have the ability to hide certain things from the operating system; they do so by obtaining (and retaining) administrative-level access.
vishing
combine phishing with Voice over IP (VoIP)
rise in VoIP now makes it possible for someone to call you
from almost anywhere in the world, without the worry of tracing/caller ID/and other features
of the land line, and pretend to be someone they are not in order to get data from you.
spear phishing
attacker uses information that the tar-
get would be less likely to question because it appears to be coming from a trusted source. (An email from the boss, for example)
whaling
phishing, or spear phishing, for so-called “big” users,
Steps of troubleshooting theory
Identify the problem Gathering Information Establishing a Theory Testing Solutions Establishing a Plan of Action Verifying Functionality Documenting the Work
POST steps
checking the CPU
checking the RAM
checking for the presence of a video card
verifying basic hardware functionality.