Security Flashcards
What are two ways people can gain unauthorized access to something?
Dumpster diving / Shoulder surfing for passwords.
What is a method used to prevent infiltration?
A man trap, where two doors and authentication is used to capture and deny people who don’t belong in the building.
What is DoS
Overwhelm servers, deny access
Three examples of hardware authentication
Smartcard readers, RSA token (keyfob with code), Badges.
What is the principal of least privilege?
Assigning the bare minimum permissions a person needs to do their job in the name of security.
What is a security policy?
Permissions an admin can set to ensure security. Things such as password max ages, desktop backgrounds, scripts to run at startup are included.
What is PII
Personally Identifiable information - Info that can lead back to a specific individual
What is PHI
Protected health information - Including medical diagnoses and healthcare received by any institution.
When it comes to compliance policies, what is PCI?
Payment card industry. Practices all people who handle transfers, accept money or deal with credit card funds must follow.
What is Open Source?
Open source allows modification and redistribution of code
What are three traits of a Virus
Replicates and Activates
Only replicates to other drives, not across networks
Requires human interaction to spread
What are two traits of a worm
Propagates across a network
Doesn’t hitchhike on programs like a virus
What are three traits of a Trojan horse
Pretends to be something it’s not
Does not replicate
Activates upon execution
What is a Rootkit
Something that hides in low level OS functions such as firmware. These can hold elevated privileges…
What is a Zero Day exploit
A vulnerability previously unknown to the devs