Securing Devices and Data Flashcards
Encrypting File System (EFS)
A file system which allows encryption of individual drives and folders on any NTFS volume.
BitLocker-To-Go
A BitLocker component used to protect removable drives, such as USB flash drives.
BitLocker
An entire volume encryption feature included with Windows Vista and Windows 7 Ultimate and Enterprise editions, and Windows 8 and higher Professional and Enterprise editions.
Trusted Platform Module (TPM)
A microchip installed on the motherboard of desktop and portable computers, which stores critical encryption keys in hardware inaccessible to the operating system or most attackers.
Degausser
A device which uses powerful electromagnets to destroy all data on magnetic media like tapes and hard drives, but not optical or flash storage.
Event Viewer
A tool used to detect and diagnose unusual system behavior.
Rescue disk
A combination of antimalware and system repair tools on a bootable disc or flash drive.
Encryption tools: EFS (Encrypting File System)
Encrypting File System allows encryption of individual drives and folders on any NTFS volume. It is included with Business/Professional/Enterprise/Ultimate editions of Windows, as well as all editions of Windows Server.
Encryption tools: BitLocker
Encrypts entire NTFS volumes, including the system drive. It is available on Enterprise and Ultimate Editions of Windows Vista and 7, Pro and Enterprise versions of Windows 8 and later, and all editions of Windows Server 2008 and later.
Encryption tools: BitLocker-To-Go
A BitLocker component used to protect removable drives, such as USB flash drives. It can encrypt drives formatted as FAT16, FAT32, and ExFAT as well as NTFS. It is included in Windows 7 and later systems which include BitLocker.
What is used to encrypt files on your USB drive?
BitLocker-To-Go
Trusted Platform Module (TPM) is a microchip installed on the motherboard of desktop and portable computers, which stores critical encryption keys in hardware inaccessible to the operating system or most attackers. True or False?
True
What allows encryption of individual drives and folders on any NTFS volume?
EFS
BitLocker: It is an entire volume encryption feature included with Windows Vista and Windows 7 Ultimate and Enterprise editions. True or False?
True
BitLocker: It uses a MDM which is a microchip installed on the motherboard of desktop and portable computers. True or False?
False
BitLocker: It can encrypt the NTFS volumes including the system volume. True or False?
True
BitLocker: It requires a smaller boot volume with at least 20 MB of free space in order to perform the decryption routines. True or False?
False
BitLocker: BitLocker Drive Encryption is compatible with EFS. True or False?
True
Screen lock options: Swipe screen
Swipe a finger across the screen, or a certain part of the screen, to unlock. This doesn’t offer any security against intrusion at all: at best, it prevents accidental input.
Screen lock options: Password
A strong password provides very strong authentication, but it’s more trouble to enter on a touchscreen keyboard than a physical one, especially if it includes mixed cases and special characters.
Screen lock options: Passcode/PIN
Unlock the device with a numeric passcode. Not as strong as a password, but easier to enter, and even a four-digit PIN allows for 10,000 combinations
Screen lock options: Pattern
Unlock the device by drawing a predefined pattern over points on the screen. This can be easier than a passcode, but choosing a pattern that’s both easy to enter and hard to guess might be challenging.
Screen lock options: Fingerprint
A biometric device with a fingerprint scanner isn’t entirely foolproof—it’s not just spy movie stuff for a clever hacker make a “fake finger” from some glue and an existing fingerprint smudge on the screen. That said, it’s strong protection against most intruders.
Screen lock options: Face
Uses the device camera and face recognition software. Can potentially be fooled by using a photo, but newer versions add additional measures like requiring the user to blink. Cameras with infrared (IR) sensitivity are especially effective for facial recognition under varying light conditions.
Mobile device policies: Permitted devices
Required features, operating systems, or models for a device to be allowed under the policy.
Mobile device policies: Support
Who supports what aspects of device functions. IT may not have the time or training to support everything that can go wrong on a wide range of user devices.
Mobile device policies: App and data ownership
Policies should clearly specify what apps and data are company property, for example work email messages and corporate documents. Mobile containerization technologies can even allow part of an employee-owned device’s memory and storage to be securely set aside for corporate purposes, or vice-versa.
Mobile device policies: Privacy
Employees should expect some privacy with personal activities and data on their own devices, but at the same time it might be limited during work hours or on company networks. The policy should spell out employee privacy expectations.
Mobile device policies: Network access
Some workplaces may choose to limit personal devices to limited access or guest networks. This can limit their usefulness, but makes it easier to secure them.
Mobile device policies: Onboarding and offboarding
There should be a set process for how an employee needs to prepare a device to join the program, and another for what happens when an employee leaves or just stops using a particular device for work. Offboarding should also address what happens with devices subsidized by the company.