Understanding Device security Flashcards
What is authentication?
identifying an individual based on a username and password
What is authorization?
giving an individual access to the system
What is accounting/auditing?
keeping track of a user’s activity while accessing network resources
What is biometrics?
authentication method that identifies and recognizes people based on physical traits. Eg. Fingerprints, face recognition, eye recognition, retinal scans and voice recognition.
What is Windows Rights management services?
RMS provides an extra level of security to documents
Encryption to limit who can access a doc or web page and what can be done with it
What are share permissions?
If you transfer a file from one destination to another it will take the destination folder permissions
If you transfer a file within the same volume the permissions will remain the same
What is malware?
Malicious software is designed to infiltrate a computer system without consent. viruses and worms
What is dishonest adware?
Trojan horses, spyware, rootkits
What is a virus?
propagates by inserting a copy of itself into and becoming part of another program. Spreads and leaves infections
What is a worm?
replicates itself
What is a trojan horse?
creates a backdoor to give malicious users access to the system
What is spyware?
software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
What is rootkit?
allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook.