Securing Operating Systems Flashcards
Policy used to define an acceptable personal device one can use for work related access
BYOD
Software used to police a BYOD
MDM (Mobile Device Management)
A code of conduct with organizational resources
AUP (Acceptable Use Policy)
An agreement used when dealing with intellectual property
NDA (non-disclosure agreement)
File Extension used with Android Apps
.apk (android package kit)
File Extension used with Apple iOS apps
.ipa (iOS app store package)
Used along with Active Directory to authenticate a user on the Windows operating system. Uses secret key cryptography in order to access other nodes on the network.
Kerberos
User group with most permissions
Administrator
User group with Read & Write permissions but cannot modify key operating system files
Power User
User group that replaced Power Users after Win 7
Standard User (Users Group)
User group that has the same permissions as a Standard User but cannot access log files. Usually used as a temporary user and should be disabled.
Guest User
File system that tracks security in ACLs, which can hold permissions in Local Users and Groups
NTFS
Permissions that are applied only when a user is accessing a file or folder on the network
Share Permissions
Permissions that are used to protect the file when the user is local
NTFS Permissions
Give the user all the other choices and ability to change permission. The user can also take ownership of the folder or any of its contents.
Full control