Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Ch. 18 Terms

TermDefinition
acceptable use policy (AUP) A document that explains to users what they can and cannot do on the corporate network or with company data, and the penalties for violations.
access control list (ACL) A record or list of the resources (for example, a printer, folder, or file) that a user, device, or program has access to on a corporate network, server, or workstation.
anti-malware software Utility software that can prevent infection, scan a system, and detect and remove all types of general malware, including viruses, spyware, worms, and rootkits.
antivirus software Utility software that can prevent infection, scan a system, and detect and remove viruses.
ATA Secure Erase Standards developed by the American National Standards Institute (ANSI) that dictate how to securely erase data from solid-state devices such as a USB flash drive or SSD drive in order to protect personal privacy.
biometric authentication To authenticate to a network, computer, or other computing device by means of biometric data, such as a fingerprint or retinal data. Touch ID on an iPhone or face lock on an Android device can perform biometric authentication
biometric device An input device that inputs biological data about a person; the data can identify a person's fingerprints, handprints, face, voice, eyes, and handwriting.
BitLocker Drive Encryption A utility in Windows 8/7/Vista that is used to lock down a hard drive by encrypting the entire Windows volume and any other volume on the drive.
BitLocker To Go A Windows utility that can encrypt data on a USB flash drive and restrict access by requiring a password.
botnet A network of zombies or robots.
brute force attack A method to hack or discover a password by trying every single combination of characters.
BYOD (Bring Your Own Device) A corporate policy that allows employees or students to connect their own devices to the corporate network.
cellular network analyzer Software and hardware that can monitor cellular networks for signal strength of cell towers, wireless access points (WAPs), and repeaters, which can help technicians better position antennas in a distributed antenna system (DAS).
certificate of destruction Digital or paper documentation, which ensures that data has been destroyed beyond recovery.
Certification Authority (CA) An organization, such as VeriSign, that assigns digital certificates or digital signatures to individuals or organizations.
chain of custody Documentation that tracks evidence used in an investigation and includesexactly what, when, and from whom the evidence was collected, the condition of the evidence, and how the evidence was secured while in possession of a responsible party.
commercial license As applied to software, the rights to use the software, which have been assigned to the user by the software vendor.
computer infestation Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software.
copyright The right to copy the work that belongs to the creators of the works or others to whom the creator transfers this right.
data loss prevention (DLP) Methods that protect corporate data from being exposed or stolen; for example, software that filters employee email to verify privacy laws are not accidentally or intentionally being violated.
degausser A machine that exposes a magnetic storage device such as a hard drive or tape drive to a strong magnetic field to completely erase the data on the storage device.
dictionary attack A method to discover or crack a password by trying words in a dictionary.
digital certificate A code used to authenticate the source of a file or document or to identify and authenticate a person or organization sending data over a network. The code is assigned by a certificate authority such as VeriSign and includes a public key for encryption.
digital rights management (DRM) Software and hardware security limitations meant to protect digital content and prevent piracy.
email filtering To search incoming or outgoing email messages for matches kept in databases, searching for known scams and spammers to protect against social engineering.
email hoax An email message that is trying to tempt you to give out personal information or trying to scam you.
Encrypted File System (EFS) A way to use a key to encode a file or folder on an NTFS volume to protect sensitive data. Because it is an integrated system service, EFS is transparent to users and applications.
End User License Agreement (EULA) A digital or printed statement of your rights to use or copy software, which you agree to when the software is installed.
enterprise license A license to use software that allows an organization to install multiple instances of the software.
entry control roster A list of people allowed into a restricted area and a log of any approved visitors that is used and maintained by security guards.
gpresult The Windows command to find out group policies that are currently applied to a system for the computer or user.
gpupdate The Windows command to refresh local group policies as well as group policies set in Active Directory on a Windows domain.
grayware A program that is potentially harmful or potentially unwanted.
intrusion detection system (IDS) Software that can run on a UTM (Unified Threat Management) appliance, router, server, or workstation to monitor all network traffic and create alerts when suspicious activity happens.
Intrusion Prevention System (IPS) Software that can run on a UTM (Unified Threat Management) appliance, router, server, or workstation to monitor all network traffic, create alerts, and prevent the threatening traffic from burrowing into the system.
key fob A device, such as a type of smart card, that can fit conveniently on a key chain.
keylogger A type of spyware that tracks your keystrokes, including passwords, chat room sessions, email messages, documents, online purchases, and anything else you type on your computer.
Local Security Policy A Windows Administrative Tools snap-in in Control Panel that can manage the group of policies in the Local Computer Policy, Computer Configuration, Windows Settings, Security Settings group of Group Policy.
Local Users and Groups For business and professional editions of Windows, a Windows utility console (lusrmgr.msc) that can be used to manage user accounts and user groups.
LoJack A technology by Absolute Software used to track the whereabouts of a laptop computer and, if the computer is stolen, lock down access to the computer or erase data on it. The technology is embedded in the UEFI/BIOS of many laptops
malicious signature Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software.
man-in-the-middle attack An attack that pretends to be a legitimate website, network, FTP site, or person in a chat session in order to obtain private information.
mantrap A physical security technique of using two doors on either end of a small entryway where the first door must close before the second door can open.
multifactor authentication (MFA) To use more than one method to authenticate access to a computer, network, or other resource.
Mutual Authentication To authenticate in both directions at the same time, as both entities confirm the identity of the other.
Network Places Wizard A Windows utility (netplwiz.exe) that can be used to change the way Windows sign-in works and to manage user accounts, including changing passwords and changing the group membership of an account.
next-generation firewall (NGFW) A firewall that combines firewall software with anti-malware software and other software that protects resources on a network.
noncompliant system A system that violates security best practices, such as out-of-date antimalware software or no anti-malware software installed.
Personal License A license to use software that gives the right to install one instance of the software.
phishing Sending an email message with the intent of getting the user to reveal private information that can be used for identity theft.
privacy filter A device that fits over a monitor screen to prevent other people from viewing the monitor from a wide angle.
Quarantined Computer A computer that is suspected of infection and is not allowed to use the network, is put on a different network dedicated to quarantined computers, or is allowed to access only certain network resources.
Ransomware Malware that holds your computer system hostage with encryption techniques until you pay money or a time period expires when the encrypted content is destroyed.
Remote Backup Application A cloud backup service on the Internet that backs up data to the cloud and is often used for laptops, tablets, and smart phones.
remote wipe Remotely erases all contacts, email, photos, and other data from a device to protect your privacy.
RFID badge A badge worn by an employee and used to gain entrance into a locked area of a building. A Radio Frequency Identification token transmits authentication to the system when the token gets in range of a query device.
root certificate The original digital certificate issued by a Certification Authority.
rootkit A type of malicious software that loads itself before the OS boot is complete and can hijack internal Windows components so that it masks information Windows provides to user-mode utilities such as File Explorer or Task Manager.
security token A smart card or other device that is one factor in multifactor authentication or can serve as a replacement for a password.
shoulder surfing As you work, other people secretly peek at your monitor screen to gain valuable information.
site license A license to use software that allows an organization to install multiple instances of the software.
smart card Any small device that contains authentication information that can be keyed into a sign-in window or read by a reader to authenticate a user on a network.
smart card reader A device that can read a smart card used to authenticate a person onto a network.
social engineering The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
software piracy The act of making unauthorized copies of original software, which violates the Federal Copyright Act of 1976.
spear phishing Sending an email message with the intent of getting the user to reveal private information that can be used for identity theft.
spoofing Sending an email message with the intent of getting the user to reveal private information that can be used for identity theft.
spyware Malicious software that installs itself on your computer or mobile device to spy on you. It collects personal information about you that it transmits over the Internet to web-hosting sites that intend to use your personal data for harm.
strong password A password that is not easy to guess.
tailgating When someone who is unauthorized follows an employee through a secured entrance to a room or building.
TPM (Trusted Platform Module) A chip on a motherboard that holds an encryption key required at startup to access encrypted data on the hard drive. Windows BitLocker Encryption can use the TPM chip.
Trojan A type of malware that tricks you into downloading and/or opening it by substituting itself for a legitimate program.
Unified Threat Management (UTM) A computer, security appliance, network appliance, or Internet appliance that stands between the Internet and a private network and runs firewall, anti-malware, and other software to protect the network.
User Accounts A Windows utility (netplwiz.exe) that can be used to change the way Windows sign-in works and to manage user accounts, including changing passwords and changing the group membership of an account.
virus A program that often has an incubation period, is infectious, and is intended to cause damage.
Wi-Fi analyser Hardware and/or software that monitors a Wi-Fi network to detect devices not authorized to use the network, identify attempts to hack transmissions, or detect performance and security vulnerabilities.
Windows Defender Anti-malware software embedded in Windows 8 that can detect, prevent, and clean up a system infected with viruses and other malware. Antispyware utility included in Windows 8/7/Vista.
Window Firewall A personal firewall that protects a computer from intrusion and is automatically configured when you set your network location in the Network and Sharing Center.
worm An infestation designed to copy itself repeatedly to memory, on drive space, or on a network, until little memory, disk space, or network bandwidth remains.
zero-day attack When a hacker discovers and exploits a security hole in software before the developer of the software can develop and provide a protective patch to close the hole.
zombie A computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the knowledge of its user.
Created by: drewtang40
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards