Securing Individual Systems Part 2 Flashcards
This is also known as media sanitation…
Data Destruction
How are monitors vulnerable?
They have USB slots that could be used to get into system
ACL
Access Control List
RATs
-Trojan that doesn’t do anything bad until someone tells it to remotely
Remote Access Trojans
Virus that’s designed to make itself hard to find
Armored Virus
Type of secure operating system?
- Windows Server
- built in funtionality
- more connections
Server OS
WPS
Press a button on your printer and then on your computer and you’re connected via WPA-2 encryption
Type of secure operating system?
-Desktop versions
Workstation
SED
-TPM built into drive
Self Encrypting Drive
EMI
Electromagnetic Interference
True or False
-Host-based firewalls are set up as implicit deny by default
True
What is a Rubber Ducky?
USB stick that you’re computer sees as a keyboard, but is actually a hacking tool that can run scripts and such
Developer could write this into software for good or bad reasons
Backdoor
Clearing
Can be done with commands such as erase, format, and delete - these methods are not final
Type of secure operating system?
- Apple
- Android
Mobile OS
IDS
-Can help detect threats to the host
Intrusion Detection System
Type of secure operating system?
- limited functions
- usually linux based
Kiosk
Programs that try to put ads up
Adware
Clustering
More than one computer doing the same job
Bluetooth has how many classes?
Class 1 - 328’
Class 2 - 33’ distance (most popular for phone/headphones)
Class 3 - 3’
Used in smart phones and cars to ensure security on these embedded systems…
Secure Boot
Where can you disable ports?
In the bios