Securing Devices and Data Flashcards
Allows encryption of individual drives and folders on any NTFS volume. It is included with Business/Professional/Enterprise/Ultimate editions of Windows, as well as all editions of Windows Server
EFS: Encrypting File System
Encrypts entire NTFS volumes, including the system drive. It is available on Enterprise and Ultimate Editions of Windows Vista and 7, Pro and Enterprise versions of Windows 8 and later, and all editions of Windows Server 2008 and later.
BitLocker
Used to protect removable drives, such as USB flash drives. It can encrypt drives formatted as FAT16, FAT32, and exFAT as well as NTFS. It is included in Windows 7 and later systems which include BitLocker
BitLocker-To-Go
Three ways BitLocker can authenticate:
Transparent operation mode
User authentication mode
USB key mode
Allows the user to start up the computer and log into Windows as normal
Transparent operation mode
Prompts the user for a PIN or password on startup
User authentication mode
Stores a startup key on a USB device
USB key mode
Use powerful electromagnets to destroy all data on magnetic media like tapes and hard drives, but not optical or flash storage
Degaussers
To securely delete files on an active computer, install a secure deletion program such as:
SDlelete, CCleaner, Eraser, and File Shredder.
Writes zeroes to the entire drive and restores it to its newly installed configuration
low-level format
Data destruction utilities
DBAN, HDShredder, and KillDisk
An entire volume encryption feature included with Windows Vista and Windows 7 Ultimate and Enterprise editions; uses a Trusted Platform Module (TPM) microchip; can encrypt the NTFS volumes including the system volume; requires a smaller boot volume with at least 100 MB of free space in order to perform the decryption routines; and is compatible with EFS
Bitlocker Drive Encryption
A type of security software used by an IT department to monitor, manage, and secure employees’ mobile devices.
Mobile device management (MDM)
Policy governs a user-owned device on the corporate network
BYOD
Swing a finger across the screen, or a certain part of the screen, to unlock.
Swipe Screen
Unlock the device with a numeric PIN.
Passcode
Unlock the device by drawing a predefined structure over points on the screen.
Pattern
A strong authentication term of identification which includes mixed cases and special characters.
Password
A camera with infrared (IR) sensitivity is effective for unlocking the device under varying light conditions.
Face
Used to force stop an app from within the operating system, or uninstall and reinstall it
App control features
Used to verify signal problems and check the signal strength or connection speed problems
Wireless analyzer
Used to monitor the system or actively scan for signs of malware
Antimalware
Used to rearrange the device to a freshly installed state, deleting user data, installed apps, and, any installed malware
Factory resets
Used to notice unusual activities in the device even if they’re not strictly malware
App scanner
Layers of defense in depth strategies
Physical Facility Internal Network Host Application Data
Signs of Maleware
File alteration, Unfamiliar programs, Security alerts, Log errors, Browser oddities, Email issues, Stability and performance, Failed updates
Malware removal tools
Antivirus scanner Antimalware software Event Viewer System Restore System backups Terminal MSCONFIG Installation media Recovery environment Rescue disk
Mobile troubleshooting tools
Antimalware App scanner Wireless analyzer App control features Backup and restore Factory resets
Steps in removing Malware
- Identify
- Quarantine the system
- Disable system restore
- Repair the system (anti-malware software)
- Update system/schedule future scans
- Enable system restore/create new restore point
- Educate and document findings
Steps to Quarantine a system
- Isolate removable storage (should be scanned)
- Disable all networking and sharing properties
- Identify other computers for infection
- Limit network connectivity
Disable System Restore
Win 10: System > System Protection > System Properties > (select drive) > Configure > Disable System Protection > (click ok)
Used to detect and diagnose unusual system behavior.
Event Viewer
Used to save and reinstate system files and settings
System Restore
Used when system files are missing or damaged
Installation media
Used when the computer won’t boot
Recovery environment
Used to change boot options
MSCONFIG
In iOS, which feature is responsible for locating and remotely wiping lost devices?
the Find My iPhone feature in iCloud
What are the three recycling or repurposing methods listed on the A+ exam guide?
Low-level format vs. standard format
Overwrite
Drive wipe
Which three protocols provide encrypted communications between 802.11x wireless clients and wireless access points?
Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2
Why does WPA use Temporal Key Integrity Protocol (TKIP)?
to ensure that a new encryption key is provided for every packet that is sent
What does three-factor authentication use?
something you know (i.e. username or password), something you have (i.e., smart card), and something you are (i.e., biometric authentication)
Which wireless security protocol is most secure: WPA, WPA2, or WEP?
WPA2
A form of malicious software and Internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer).
Rogue antivirus
A decoy computer system which helps to trap hackers or track unconventional or new hacking methods.
Honeypot
A code that is intended to take full or partial control of a system at the lowest levels.
Rootkit
Provides strong authentication for client/server applications by using secret-key cryptography.
Kerberos
Steps to remove malware
- Identify symptoms
- Quarantine the infected systems
- Disable system restore
- Remediate infected system
- Update/install anti-malware software
- Scan and use removal techniques
- Schedule scans and run update
- Enable system restore and create a restore point
- Educate the end-user