Securing Computers Flashcards

1
Q

Occurs when a person accesses resources without permission

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One way to gain unauthorized access

A

Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Generic term for searching refuse for information. A form of intrusion

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Technique for gaining unauthorized access. Observing someone’s screen or keyboard to get information, often passwords

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of using or manipulating people inside the organization to gain access to its network or facilities

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Following someone through the door as if you belong. Form of infiltration

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A small room with a set of two doors, one to the outside, unsecured area and one to the inner, secure area. When walking through one, the outer door must be closed before the inner door can be opened

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The act of trying to get people to give their usernames, passwords, or other security information by pretending to be someone else electronically

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Term used for targeted attacks, like when a bad guy goes after a specific celebrity

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Uses various methods to overwhelm a system, such as a Web server, to make it essentially nonfunctional

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uses many machines simultaneously to assault a system

A

Distributed DoS (DDoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Composed of interlinked areas that a good security-minded tech should think about: physical security, authentication, users and groups, and security policies

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can keep someone from quickly walking off with the hardware

A

Cable Locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Make it harder to plug in a USB drive to load malware for stealing data

A

USB Locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Limit access to a server’s port and drives. There are also locking rack doors to limit access to the front or back of an entire server rack

A

Server Locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Block specific computers, adding their MAC addresses to the ranks of the undesired

A

Blacklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Pre-specify the only MAC addresses allowed access. Not bulletproof since a savvy attacker can spoof an address (they’ll have a much easier time sniffing a valid Wi-Fi MAC address than a wired one, though) from another device accessing the network

A

Whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How the computer determines who can or should access it and, once accessed, what that user can do

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Credit card-sized cards with circuitry that can identify the bearer of the card. Relatively common for tasks such as authenticating users for mass transit systems but are fairly uncommon in computers

A

Smart Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Devices that store some unique information that the user carries on their person. May be digital certificates, passwords, or biometric data. May also store an RSA token. Most hardware tokens come in the form of key fobs

A

Security Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Random-number generators that are used with user names and passwords to ensure extra security

A

RSA Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Devices that require some sort of physical, flesh-and-blood authentication

A

Biometric Devices/Locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Type of biometric lock where you place your eye up to a scanning device

A

Retinal Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Permissions for activities, as opposed to true permissions, which control access to resources

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Organizing data according to its sensitivity. Common scheme classifies documents as public, internal use only, highly confidential, top secret, and so on

A

Data Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Members of an organization or company must abide by or comply with all of the rules that apply to the organization or company

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Any data that can lead back to a specific individual. Kind of regulated data

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Basically any PII that involves a person’s health status, medical records, and healthcare services they have received. Kind of regulated data

A

Protected Health Information (PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A rigorous set of rules for systems that accept, transmit, process, or store credit/debit card payments

A

Payment Card Industry (PCI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Fairly new law that defines a broad set of rights and protections for the personal information of citizens living in countries in the European Union

A

General Data Protection Regulation (GDPR)

31
Q

Various forms of this enforce how you use commercial software. Many programs require activation over the Internet or a special account with the copyright holder

A

Digital Rights Management (DRM)

32
Q

Allow you to take original code and modify it

A

Open Source Software Licenses

33
Q

Stipulate that you can’t modify the source code or make it part of some other software suite

A

Closed Source Software Licenses

34
Q

In the security sense means to tell Windows to create an entry in the Security Log when certain events happen, such as when a user logs on or tries to access a certain file or folder

A

Auditing

35
Q

Defines what actions employees may or may not perform on company equipment

A

Acceptable Use Policy (AUP)

36
Q

Defines any program or code that’s designed to do something on a system or network that you don’t want done. Comes in a variety of guises: viruses, worms, randomware, spyware, Trojan Horses, keyloggers, and rootkits

A

Malware

37
Q

A program that has two jobs: to replicate and to activate. Needs human action to spread

A

Virus

38
Q

Functions similarly to a virus, except it does not need to attach itself to other programs to replicate. Can replicate on its own through networks, or even hardware like Thunderbolt accessories

A

Worm

39
Q

A piece of malware that appears or pretends to do one thing while, at the same time, it does something evil. May be a game or a fake security program. Doesn’t replicate.

A

Trojan Horse

40
Q

Malware that records the user’s keystrokes and makes that information available to the programmer. A lot of parental control tools use these

A

Keylogger

41
Q

A program that takes advantage of very low-level OS functions to hide itself from all but the most aggressive of anti-malware tools. Gains privileged access to the computer. Can strike OSes, hypervisors, and even firmware

A

Rootkit

42
Q

Malicious software, generally installed without your knowledge, that can use your computer’s resources to run distributed computing apps, capture keystrokes to steal passwords, or worse. Classic ones often sneak onto systems by being bundled with legitimate software

A

Spyware

43
Q

Malicious software that encrypts all the data it can gain access to on a system

A

Ransomware

44
Q

A network in infected computers (zombies) under the control of a single person or group, with sizes easily growing into the millions of zombies for the largest networks. One of the most common uses: sending spam

A

Botnet

45
Q

The route the malware takes to get into and infect the system

A

Attack Vector

46
Q

An attack on a vulnerability that wasn’t already known to the software developers

A

Zero-Day Attack

47
Q

The process of pretending to be someone or something you are not by placing false information into your packets

A

Spoofing

48
Q

An attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those systems, reading or in some cases even changing the data and then sending the data on

A

Man-in-the-middle (MITM) Attack

49
Q

Tries to intercept a valid computer session to get authentication information. Only tries to grab authentication information

A

Session Hijacking

50
Q

A special value, saved by the authentication system, computed from the password; each time the user logs in, the system re-computes this special value and compares it with the saved copy. Computation that creates them is irreversible; the only way to figure out what password produced a given one is to guess a password, perform the same computation, and see if they match

A

Hash

51
Q

Use complicated math to co dense dictionary tables with hashed entries dramatically. Binary files, not text files, and can store amazing amounts of information in a relatively small size

A

Rainbow Tables

52
Q

Unwanted, unknown, or unplanned file downloads like from a pop-up

A

Drive-By Downloads

53
Q

Protects your PC in two ways: working in an active seek-and-destroy mode and in a passive sentry mode

A

Anti-Malware Program

54
Q

The program scans the computer’s boot sector and files for viruses and, if it finds any, present you with the available options for removing or disabling them

A

Seek-and-Destroy Mode

55
Q

Passively monitors a computer’s activity, checking for viruses only when certain events occur, such as a program execution or file download

A

Virus Shield

56
Q

The code pattern of a known virus

A

Signature

57
Q

Attempts to change its signature to prevent detection by antivirus programs, usually by continually scrambling a bit of useless code. Fortunately, the scrambling code itself can be identified and used as the signature - once the antivirus makers become aware of the virus

A

Polymorphic Virus/Polymorph

58
Q

Number generated by the software based on the contents of the file rather than the name, date, or size of that files. Every time a program is run, the antivirus program calculates a new one and compares it with the earlier calculation. If they are different, it is a sure sign of a virus

A

checksum

59
Q

Boot sector viruses that use various methods to hide from antivirus software

A

Stealth Virus programs

60
Q

Describes software or a remote DNS provider that implements some additional filtering to block your devices from visiting all kinds of malicious Web sites

A

SecureDNS

61
Q

The list of virus signatures your antivirus program can recognize. Must be kept up to date so your antivirus software has the latest signatures

A

Definition File

62
Q

Core anti-malware programming

A

Engine

63
Q

Fixing things the virus or other malware harmed. Can mean replacing corrupted Windows Registry files or even startup files

A

Remediation

64
Q

Devices or software that protect an internal network from unauthorized access to and from the Internet at large. Use a number of methods to protect networks, such as hiding IP addresses and blocking TCP/IP ports

A

Firewalls

65
Q

Used by hardware firewalls to inspect each incoming packet individually. Also blocks any incoming traffic that isn’t in response to your outgoing traffic

A

Stateful Packet Inspection (SPI)

66
Q

Enables you to open a port in the firewall and direct incoming traffic on that port to a specific IP address on your LAN

A

Port Forwarding

67
Q

Enables you to open an incoming connection to one computer automatically based on a specific outgoing connection

A

Port Triggering

68
Q

The outgoing connection

A

Trigger Port

69
Q

The incoming connection

A

Destination Port

70
Q

An Internet application that inspects packets, looking for active intrusions. Functions inside the network, watching for threats that a firewall might miss, such as viruses, illegal logon attempts, and other well-known attacks. Inspects traffic inside the network so it can discover internal threats. Always has some way to let the network administrators know if an attack is taking place: at the very least the attack is logged, but some offer a pop-up message

A

Intrusion Detection System (IDS)

71
Q

Similar to an IDS but this sits directly in the flow of the network traffic. Can stop an attack while it is happening. The network bandwidth and latency can take a hit. If it goes down, the network link may go down too. Some can block incoming packets on-the-fly based on IP address, port number, or app type

A

Intrusion Protection System (IPS)

72
Q

Takes the traditional firewall and packages it with many other security services such as IPS, VPN, load balancing, antivirus, and many other features depending on the make and model

A

Unified Threat Management (UTM)

73
Q

Derived from IP security, is Microsoft’s encryption method of choice for networks consisting of multiple networks linked together by some sort of private connection. Provides transparent encryption between the server and the client

A

IPsec

74
Q

Signed by a trusted certificate authority (CA) that guarantees that the public key you are about to get is actually from the Web server and not from some evil person trying to pretend to be the Web server

A

Digital Certificate