click below
click below
Normal Size Small Size show me how
aplus chapter 19
terms
Question | Answer |
---|---|
security standard | iso |
security standard | nist |
security standard | hippa |
security goal | protect resources |
security goal | not interfere with the functions of the system |
pdsa | plan do study act cycle |
pdsa | plan do study act |
authentication | proves you are who you say you are |
authentication techniques | user name password pin smart card biometric data |
authorization | determines what an individual can do in the system |
plan | what standards or rules do we have to follow |
do | implement the standards and rules |
study | methods to monitor the system or plan |
act | maintain and improve as needed |
authorization is done in two ways | assigning rights to users assigning permissions to folders and files |
administrator account | complete access to the system and can make changes that affect the security of the system and other users |
adware | software installed on a computer that produces pop up ads using your browser |
antivirus software | utility programs that prevent infection or scan a system to detect and remove viruses |
backdoor | a hidden way to allow malware to reach the system in secret even after the malware has been removed |
backup operator | can back up and restore any files on the system regardless of its access permissions to these files |
bitlocker encryption | used to lock down a hard drive by encrypting the entire vista volume and any other volume on the drive |
boot sector virus | an infectious program that can replace the boot program with a modified, infected bersion, often causing boot and data retrieval problems |
browser hijacker | a malicious program that infects your web browser and can change your home page or browser settings |
chap | a protocol used to encrypt account names and paswords that are sent to a network controller for validation |
data classifications | categories of data used to determione who owns the data and who needs what type of access to it |
digital certificate | a code used to authenticate the source of a file or document or to identify and authenticate a person or organization sending data over a network |
drive lock password | stored on a hard drive,must enter the password at startup before you can access data on the drive |
advantage of using smart card that display a number | no special equipment needed |
encryption | the process of putting readable data into an encoded form that can only be decoded or decrypted though use of a key |
file virus | inserts virus code into an executable program file and can spread whenever that program is executed |
grayware | a program that av software recognizes to be potentially harmful or potentially unwanted |
guest account | normally not activated and has very limited rights |
incident report | report unusual or atypical events |
infestation | any unwanted program that is transmitted to a computer without the users knowledge and that is designed to do varying degrees of damage to data and software |
kerberos | a protocol used to encrypt account names and passwords that are sne to a network controller for validation |
key fob | a device that fits on a key chain |
key logger | a type of spyware that tracks your keystrokes |
limited account | has read write access only on its own folders,read only access to most system folders,and no access to others users data |
logic bomb | malicious software that is dormant code added to software and triggered at a predetermined time |
macro | a small sequence of commands contained within a document that can be authomatically executed when the document is loaded,or executed later |
macro viruses | virus that hides in the macros of a document file |
malicious software | malware |
malware | malicious software |
multiparite virus | combination of a boot sector virus and a file virus |
network drive map | mounting a drive to the computer that is actually har drive space on another host computer on the network |
pass phrase | a type of password that can contain a phrase where spaces are allowed |
password reset disk | a device that holds a copy of the windows password |
permissions | refer to the user accounts or user groups allowed to access data |
phishing | a type of identity theft where a person is baited into giving personal data to a web site |
pki | public key infrastructures |
pki | standards used to encrypt,transport, and valiate digitial certificates over the internet |
power user account | can read from and write to parts of the system other than his own local drive |
public key encryption | encryption technology that uses a public and private key |
rootkit | malicious software that loads itself before the os boot is complete and can hijack internal windows components so that it masks info windows provides |
scam email | email intended to lure you into a scheme |
script virus | virus hides in a script which might execute when you click a link on a web page or in an html email message |
smart card | small device containing authentication information |
smart card reader | a device that can read a smart card used to authenticate a person onto a network |
social engineering | practice of tricking people into giving out private info or allowing unsafe programs into the network or on the computer |
spam | junk mail you dont want |
spyware | malicious software that installs itself on your computer to spy on you |
standard account | can use software and hardware and make some system changes,but cannot make changes that affect the security of thee system or other users |
strong password | password that is not easy to guess |
tpm | trusted platform module chip |
trojan horse | a type of infestation that hides or disguises itself as a useful program ,designed to cause damage when executed |
virus | a program with an incubation period ,is infectious,and is intended to caude damage |
virus hoax | email that does damage by tempting you to forward it to everyone in your email address book with the intent of clogging p email systems |
worm | an infestation designed to repeatedly copy itself into memory,on drive space or on a network until no memory or bandwith exists |
zero fill utility | fills every sector on the hard drive with zeros |
tpm | a chip on a motherboard that holds an encryption key required at startup to access encrypted data on the hard drive |
advantage of a drive lock password | protects the hard drive data even when removed |
power on passwords | assigned in bios setup and kept in cmos ram |
fault tolerance limit | how off you can be |
strong password criteria | eight or more passphrase upper and lower case one symbol |
rights | privilieges, tasks an account is allowed to do in the system |
permissions | user accounts or groups allowed to access data |
data classifications guidelines | follow security policies |
data classifications guidelines | data folder must have an owner |
data classifications guidelines | base on organization security needs |
data classifications guidelines | protect backup data as well |
rights | assigned to an account |
permissions | assigned to data |
phishing | sending an email message with the intent of getting the user to reveal private information |
types of permissions | read only write modify archive |
data classification | permissions assigned to folders and files |
data classification as applied to security | put data into categories |
owner of a folder | decides who gets to see it and what type of access they have |
encryption | puts data into code that must be translated before it can be accessed |
windows explorer,encrypted files and folders names are | displayed in green |
network attached storage device | a computer that does nothing but provide hard drive storage on a network for other computers |
host computer | share the folder or entire volume to which you want others to have access |
vpn | best practice to secure data when traveling or work from home |