click below
click below
Normal Size Small Size show me how
Chapter 22 Software
Term | Definition |
---|---|
Security Guards | physical security for your installation should begin with personnel - specifically, and security-focused personnel |
Mantraps | helps to prevent users from tailgating |
biometrics | use physical characteristics to identify the user |
Hardware Tokens | used to access network resources |
Cable locks | used to secure laptops |
Full Control | gives the user all the other permissions as well as permission to take ownership and change permission |
Modify | Combines the Read & Execute permission with the write permission and further allows the user to delete the file |
Read | Allows the user to view the contents of the file and to see ownership and attributes |
Read & Execute | Combines the Read permission with the ability to execute |
Write | Allows the user to overwrite the file as well as to change attributes and see ownership and permissions |
Object class | objects can be organized based on their class or type |
Geographic Location | objects can be organized based off of location |
Function | Objects can be organized based on their function in the organization,such as servers,workstations, and users |
Hybrid | have to stick to one organization of objects |
Social engineering attacks | is the process in which an attacker attempts to acquire information about your network and system by social means,such as talking to people in the organization |
Spoofing attacks | is an attempt by someone or something to masquerade as someone else |
Armored Virus | is designed to make itself difficult to detect or analyze |
Companion Virus | attaches itself to legitimate programs and then creates a program with a different filename extension |
Macro Virus | exploits the enhancements made to many application programs |
Multipartite Virus | attacks your system in multiple ways. Such as destroy your application files, boot sector,and word documents |
Phage Virus | alters programs and databases |
Polymorphic Virus | change form to avoid detection |
Retrovirus | attacks or bypasses the antivirus software installed on a computer |
Stealth Virus | attempts to avoid detection by masking itself from applications |