terms
Help!
|
|
||||
|---|---|---|---|---|---|
| physical security | restricting access to the areas in which equipment is located
🗑
|
||||
| physical security | hardware locks
🗑
|
||||
| physical security | proximity readers
🗑
|
||||
| physical security | access lists
🗑
|
||||
| physical security | man traps
🗑
|
||||
| physical security | video surveillance
🗑
|
||||
| physical security | fencing
🗑
|
||||
| deadbolt lock | extends a solid metal bar into the doorframe for extra security
🗑
|
||||
| cipher lock | combination locks that use buttons which must be pushed in a sequence to unlock a door
🗑
|
||||
| cipher lock | keep a record of when the door was open and closed
🗑
|
||||
| disadvantage of cipher lock | shoulder surfing
🗑
|
||||
| proximity reader | detects an emitted signal in order to identify the owner
🗑
|
||||
| physical token | id badge
🗑
|
||||
| access lists | people who are allowed in
🗑
|
||||
| snap in | software module that provides admin capabilities for a device
🗑
|
||||
| group policy | microsoft windows feature that provides centralized management and configuration of computers
🗑
|
||||
| patch | general security software update inended to cover vulnerabilities that have been discovered
🗑
|
||||
| hotfix | software that addresses a specific customer situation and often may not be distributed outside that customers organization
🗑
|
||||
| service pack | software that is a cumulative package of all security updates plus additional features
🗑
|
||||
| most common type of door lock | standard key entry lock
🗑
|
||||
| group policy | allows a single configuration to be set and then deployed by many users
🗑
|
||||
| mantrap | monitors and controls two interlocking doors to a small room,vestibule,designed to seperate secure and nonsecure areas
🗑
|
||||
| fencing deterrents | anti climb paint
🗑
|
||||
| fencing deterrents | anti climb collar
🗑
|
||||
| fencing deterrents | roller barrier
🗑
|
||||
| fencing deterrents | rotating spikes
🗑
|
||||
| remote wipe sanitation | technology that can remotely erase data from a portable device and reset it back to factory default settings
🗑
|
||||
| rfid tags | radio frequency identification tags
🗑
|
||||
| steps in protecting the operating system that is running on the host | develop the security policy
🗑
|
||||
| steps in protecting the operating system that is running on the host | perform host software baselining
🗑
|
||||
| steps in protecting the operating system that is running on the host | configure operating system security and settings
🗑
|
||||
| steps in protecting the operating system that is running on the host | deploy the settings
🗑
|
||||
| steps in protecting the operating system that is running on the host | implement patch management
🗑
|
||||
| security template settings include | account policies
🗑
|
||||
| security template settings include | user rights
🗑
|
||||
| security template settings include | event log settings
🗑
|
||||
| security template settings include | restricted groups
🗑
|
||||
| security template settings include | system services
🗑
|
||||
| security template settings include | file permissions
🗑
|
||||
| security template settings include | registry permissions
🗑
|
||||
| mobile device security | gps tracking
🗑
|
||||
| mobile device security | remote wipe sanitation
🗑
|
||||
| mobile device security | voice encryption
🗑
|
||||
| antivirus software | examines a computer for infections as well as monitor activity
🗑
|
||||
| signature file | a sequence of bytes,strings, found in the virus as a virus signature
🗑
|
||||
| heuristic detection | create a virtualized environment to simulate the cpu and memory of the computer to check for a virus
🗑
|
||||
| bayesian filtering | spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if its spam
🗑
|
||||
| blacklist | no email is to be received
🗑
|
||||
| whitelist | only email can be received
🗑
|
||||
| popup blocker | program or feature within a browser that stops ads from appearing
🗑
|
||||
| anti spyware | helps prevent computers from becoming infected
🗑
|
||||
| firewall | hardware or software that is designed to prevent malicious packets from entering or leaving a pc
🗑
|
||||
| packet filter | firewall
🗑
|
||||
| host based software firewall | runs on a program on a local system to protect it against attacks
🗑
|
||||
| audit log | tracks user authentication attempts
🗑
|
||||
| access log | provides details regarding requests for specific files on a system
🗑
|
||||
| security log | considered the primary source of log data
🗑
|
||||
| event | occurence within a software system that is communicated to users or other programs outside of the operating system
🗑
|
||||
| system event | operational actions performed by the operating system,such as shutting down
🗑
|
||||
| system event logs | document any unsuccessful events and the most significant successful event
🗑
|
||||
| audit records | the second common type of security related operating system logs
🗑
|
||||
| common types of security application logs | anti virus software log
🗑
|
||||
| exceptions | faults that occur in an application while it is running
🗑
|
||||
| cross site request forgery | uses the users web browser settings to impersonate the user
🗑
|
||||
| input validation | verify a users input to an application
🗑
|
||||
| fuzz testing | fuzzing
🗑
|
||||
| fuzz testing | software testing technique that deliberatle provides invalid,unexpected, or random data as inputs to a computer program
🗑
|
||||
| data loss prevention | system of security tools that is used to recognize and identify data that is crucial and to ensure it is protected
🗑
|
||||
| dlp examines data in three states | data in use
🗑
|
||||
| dlp examines data in three states | data in motion
🗑
|
||||
| dlp examines data in three states | data at rest
🗑
|
||||
| content inspection | used by most data loss prevention systems
🗑
|
||||
| content inspection | defined as a secuirity analysis of the transaction within its approved context
🗑
|
||||
| data in use | actions being performed by endpoint devices such as printing
🗑
|
||||
| data in motion | actions that transmit the data across a network like a file being retreived from a server
🗑
|
||||
| data at rest | data that is stored on a dvd or other media
🗑
|
||||
| dlp agent | each host runs a local application which is sent over the network to the devices and runs as an os device
🗑
|
||||
| dlp agent | continuously monitors the host to identify sensitive data within the files
🗑
|
||||
| attacks based on application vulnerabilities | executable files attack
🗑
|
||||
| attacks based on application vulnerabilities | system tampering
🗑
|
||||
| attacks based on application vulnerabilities | process spawning control
🗑
|
||||
| application hardening | intended to prevent exploiting vulnerabilities in software applications
🗑
|
||||
| heuristic detection | code emulation
🗑
|
||||
| common types of security application logs | automatred patch update log
🗑
|
||||
| in application software, vulnerabilities are often exposed by a failure | to properly check the input data entering into the application
🗑
|
||||
| baseline | standard or checklist by which security standards can be evaluated and audited for security posture
🗑
|
||||
| baseline | operating system settings that impose how the policy will be enforced
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
cgeaski
Popular Computers sets