click below
click below
Normal Size Small Size show me how
CIT173 Ch 4 - 6
Key Terms Chapters 4 - 6 CIT173
| Term | Definition |
|---|---|
| Access Control Entries (ACE) | A specific entry in a file or folder’s ACL that uniquely identifies a user or group by its security identifier and the action it is allowed or denied to take on that file or folder. |
| Access Control List (ACL) | For those file systems that support ACLs for files and folders, such as NTFS, the ACL is a property of every file and folder in that file system. |
| basic disk | An older, IBM |
| Disk Management console | An MMC console snap-in used to administer hard disks in Windows 10. |
| DiskPart A command-line tool for managing disks. You can perform advanced operations with DiskPart that are not available in Disk Management | |
| disk quota | A system of tracking owners for file data within an NTFS-formatted partition or volume and the total disk space consumed by each owner. Limits or warning can be established to restrict disk space usage. |
| dynamic disk | A method for organizing disks introduced in Windows 2000 as a replacement for basic disks, but was never very popular. Dynamic disks can have a large number of volumes and also support some fault tolerant disk configurations. |
| File Allocation Table (FAT) | A file system used to organize files and folders in a partition or volume. The common versions of FAT supported by Windows 10 include FAT, FAT32 and exFAT. |
| Master Boot Record (MBR) | The Master Boot Record exists at the very first sector of hard disk. It contains code to start the load process for an operating system from a partition or volume on the disk |
| mount point An empty folder in an NTFS-formatted file system that is used to point to another FAT, FAT32, or NTFS partition. | |
| New Technology File System (NTFS) | A file system introduced with Windows NT. NTFS supports advanced features to add reliability, security, and flexibility that file systems such as FAT and FAT32 do not have. |
| partition table | A data structure contained in the MBR that is used to identify reserved areas of disk space for hard disks formatted for x86 computers. |
| Resilient File System (ReFS) | A file system introduced with Windows Server 2012 that supports basic NTFS-like features and self-healing technology for resilient bulk file storage when used together with Storage Spaces technology. |
| storage pool | A logical collection of disks that have been allocated to Storage Spaces. Disks must be assigned to a storage pool before Storage Spaces can use them. |
| storage space | A virtual disk created from the space made available by a storage pool in Storage Spaces. |
| Storage Spaces | Microsoft’s software-based disk pooling technology that allows for different levels of resiliency to disk failure and provides virtualized volume storage within the disk pool. |
| Thunderbolt | A trade name for a high speed hardware based interface to connect external devices to a computer, co-developed by Apple and Intel |
| virtual hard disk (VHD) | A file that is internally structured to store data like a file system. A VHD can be attached in Windows 10 and the contents accessed like a hard disk. VHDs can be fixed size or dynamically expanding. For Windows 10, they can also be VHD or VHDX format. |
| volume | A term used to refer to a region of disk space reserved to store file data. The term is used to generically refer to both dynamic disk volumes and basic disk partitions. |
| administrator account | The type of user account that is made a member of the Administrators local group and has full rights to the system. |
| Administrator account | The built-in Windows 10 account that is created during installation and has full rights to the system. This account cannot be deleted or removed by the Administrators group. |
| assigned access | A sign-in option that you can configure for a single local user account that restricts the user to using only an assigned Windows Store app; often used to configure Windows 10 as a kiosk. |
| biometric authentication | Authentication that is based on physical characteristics of the user such as a finger print or facial recognition. |
| built-in local groups | Groups that are automatically created for each Windows 10 computer and stored in the SAM database. |
| cached credentials | Credentials that are stored in Windows 10 after a user has signed in to a domain or Microsoft account. Cached credentials can be used to sign in when a domain controller cannot be contacted or when there is no network connectivity. |
| default profile | The profile that is copied when new user profiles are created. |
| domain-based network | A network where security information is stored centrally in Active Directory. |
| fast user switching | Allows multiple users to have applications running at the same time. However, only one user can be using the console at a time. |
| folder redirection | A feature that redirects profile folders from the local computer to a network location. |
| Guest account | A built-in Windows 10 account with minimal privileges intended to give very limited access to Windows 10. This account is disabled by default. |
| initial account | The account with administrative privileges created during the installation of Windows 10. |
| local user account | A user account that is defined in the SAM database of a Windows 10 computer. Local user accounts are valid only for the local computer. |
| Local Users and Groups MMC snap-in | An MMC snap-in that is used to manage users and groups. |
| mandatory profile | A profile that cannot be changed by users. NTUSER.DAT is renamed to NTUSER.MAN. |
| Microsoft account | An account that is stored online by Microsoft. You can use it to authenticate to multiple Microsoft cloud services and Windows 10. |
| Microsoft Passport | A n multifactor authentication system in Windows 10 that enhances security by avoiding the use of a user name and password. Biometric authentication on the client allows access to the remote system. |
| NTUSER.DAT | The file containing user-specific registry entries in a user profile. |
| pass-through authentication | Automatic authentication to a remote resource when the local computer passes the local credentials to the remote computer. |
| peer-to-peer network | A network where all computers store their own security information and share data. |
| picture password authentication | An authentication method where you trace gestures on a picture. |
| PIN authentication | An authentication method where you enter a device specific PIN rather than a user name and password. |
| public profile | A profile that is merged with all other user profiles. The public profile does not contain an NTUSER.DAT file. |
| roaming profile | A user profile that is stored in a network location and is accessible from multiple computers. Roaming profiles move with users from computer to computer. |
| secure sign-in | Adds the requirement to press Ctrl+Alt+Delete before signing in. |
| Security Accounts Manager (SAM) database | The database used by Windows 10 to store local user and group information. |
| Security Identifier (SID) | A user- or group-specific number that is added to the access control list of a resource when a user or group is assigned access. |
| smart card | A physical card containing a certificate that can be used as an authentication method. |
| standard user account | A type of user account that does not have privileges to modify settings for other users. This type of account is a member of the Users local group. |
| trusted platform module (TPM) | A chip on the motherboard of a computer that is designed to securely store encryption keys and certificates. |
| user account | Required account used for authentication to prove the identity of a person signing in to Windows 10. |
| User Accounts applet | A legacy interface for user management in Control Panel. |
| user profile | A collection of desktop and environment configurations for a specific user or group of users. By default, each user has a separate profile stored in C:\Users. |
| virtual smart card | An authentication method similar to a smart card, but the certificate is stored in a TPM on the motherboard rather than on a physical card. |
| Windows Hello | Biometric authentication functionality in Windows 10. At release Windows Hello supported fingerprints, facial recognition, and iris scanning. |
| account lockout policy | A collection of settings, such as lockout duration, that control account lockouts. |
| application manifest | An XML file that describes the structure of an application, including required DLL files and privilege requirements. |
| AppLocker | A feature in Windows 10 that is used to define which programs are allowed to run. This is a replacement for the software restriction policies found in Windows XP and Windows Vista, but it is not available in Windows 10 Pro. |
| asymmetric encryption algorithm | An encryption algorithm that uses two keys to encrypt and decrypt data. Data encrypted with one key is decrypted by the other key. |
| audit policy | The settings that define which operating system events are audited. |
| auditing | The security process that records the occurrence of specific operating system events in the Security log. |
| BitLocker Drive Encryption | A feature in Windows 10 that can encrypt the operating system partition of a hard drive and protect system files from modification. Other partitions can also be encrypted. |
| BitLocker To Go | A new feature in Windows 10 that allows you to encrypt removable storage. |
| Encrypting File System (EFS) | An encryption technology for individual files and folders that can be enabled by users. |
| Full Volume Encryption Key (FVEK) | The key used to encrypt the Volume Master Key (VMK) when BitLocker Drive Encryption is enabled. |
| hashing algorithm | A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed. |
| local security policy | A set of security configuration options in Windows 10. These options are used to control user rights, auditing, password settings, and more. |
| malware | Malicious software designed to perform unauthorized acts on your computer. Malware includes viruses, worms, and spyware. |
| password policy | A collection of settings to control password characteristics such as length and complexity. |
| Secedit | A command-line tool that is used to apply, export, or analyze security templates. |
| Security Configuration and Analysis tool | An MMC snap-in that is used to apply, export, or analyze security templates. |
| security template | An .inf file that contains security settings that can be applied to a computer or analyzed against a computer’s existing configuration. |
| symmetric encryption algorithm | An encryption algorithm that uses the same key to encrypt and decrypt data. |
| User Account Control (UAC) | A feature in Windows 10 that elevates user privileges only when required. |
| Volume Master Key (VMK) | The key used to encrypt hard drive data when BitLocker Drive Encryption is enabled. |
| Windows Defender | Antimalware software included with Windows 10. |