Securing Computers Flashcards
Occurs when a person accesses resources without permission
Unauthorized Access
One way to gain unauthorized access
Intrusion
Generic term for searching refuse for information. A form of intrusion
Dumpster Diving
Technique for gaining unauthorized access. Observing someone’s screen or keyboard to get information, often passwords
Shoulder Surfing
The process of using or manipulating people inside the organization to gain access to its network or facilities
Social Engineering
Following someone through the door as if you belong. Form of infiltration
Tailgating
A small room with a set of two doors, one to the outside, unsecured area and one to the inner, secure area. When walking through one, the outer door must be closed before the inner door can be opened
Mantrap
The act of trying to get people to give their usernames, passwords, or other security information by pretending to be someone else electronically
Phishing
Term used for targeted attacks, like when a bad guy goes after a specific celebrity
Spear Phishing
Uses various methods to overwhelm a system, such as a Web server, to make it essentially nonfunctional
Denial of Service (DoS)
Uses many machines simultaneously to assault a system
Distributed DoS (DDoS) attack
Composed of interlinked areas that a good security-minded tech should think about: physical security, authentication, users and groups, and security policies
Access Control
Can keep someone from quickly walking off with the hardware
Cable Locks
Make it harder to plug in a USB drive to load malware for stealing data
USB Locks
Limit access to a server’s port and drives. There are also locking rack doors to limit access to the front or back of an entire server rack
Server Locks
Block specific computers, adding their MAC addresses to the ranks of the undesired
Blacklist
Pre-specify the only MAC addresses allowed access. Not bulletproof since a savvy attacker can spoof an address (they’ll have a much easier time sniffing a valid Wi-Fi MAC address than a wired one, though) from another device accessing the network
Whitelist
How the computer determines who can or should access it and, once accessed, what that user can do
Authentication
Credit card-sized cards with circuitry that can identify the bearer of the card. Relatively common for tasks such as authenticating users for mass transit systems but are fairly uncommon in computers
Smart Card
Devices that store some unique information that the user carries on their person. May be digital certificates, passwords, or biometric data. May also store an RSA token. Most hardware tokens come in the form of key fobs
Security Token
Random-number generators that are used with user names and passwords to ensure extra security
RSA Token
Devices that require some sort of physical, flesh-and-blood authentication
Biometric Devices/Locks
Type of biometric lock where you place your eye up to a scanning device
Retinal Scanner
Permissions for activities, as opposed to true permissions, which control access to resources
Policies
Organizing data according to its sensitivity. Common scheme classifies documents as public, internal use only, highly confidential, top secret, and so on
Data Classification
Members of an organization or company must abide by or comply with all of the rules that apply to the organization or company
Compliance
Any data that can lead back to a specific individual. Kind of regulated data
Personally Identifiable Information (PII)
Basically any PII that involves a person’s health status, medical records, and healthcare services they have received. Kind of regulated data
Protected Health Information (PHI)
A rigorous set of rules for systems that accept, transmit, process, or store credit/debit card payments
Payment Card Industry (PCI)