click below
click below
Normal Size Small Size show me how
Chapter 22 Software
| Term | Definition |
|---|---|
| Security Guards | physical security for your installation should begin with personnel - specifically, and security-focused personnel |
| Mantraps | helps to prevent users from tailgating |
| biometrics | use physical characteristics to identify the user |
| Hardware Tokens | used to access network resources |
| Cable locks | used to secure laptops |
| Full Control | gives the user all the other permissions as well as permission to take ownership and change permission |
| Modify | Combines the Read & Execute permission with the write permission and further allows the user to delete the file |
| Read | Allows the user to view the contents of the file and to see ownership and attributes |
| Read & Execute | Combines the Read permission with the ability to execute |
| Write | Allows the user to overwrite the file as well as to change attributes and see ownership and permissions |
| Object class | objects can be organized based on their class or type |
| Geographic Location | objects can be organized based off of location |
| Function | Objects can be organized based on their function in the organization,such as servers,workstations, and users |
| Hybrid | have to stick to one organization of objects |
| Social engineering attacks | is the process in which an attacker attempts to acquire information about your network and system by social means,such as talking to people in the organization |
| Spoofing attacks | is an attempt by someone or something to masquerade as someone else |
| Armored Virus | is designed to make itself difficult to detect or analyze |
| Companion Virus | attaches itself to legitimate programs and then creates a program with a different filename extension |
| Macro Virus | exploits the enhancements made to many application programs |
| Multipartite Virus | attacks your system in multiple ways. Such as destroy your application files, boot sector,and word documents |
| Phage Virus | alters programs and databases |
| Polymorphic Virus | change form to avoid detection |
| Retrovirus | attacks or bypasses the antivirus software installed on a computer |
| Stealth Virus | attempts to avoid detection by masking itself from applications |