Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
1.1 IPSEC |
1.1 Protocol used to authenticate the IP Addresses and encrypt the payload.
|
|
1.1 C. I. A.
|
1.1 Confidentiality, Integrity and Availability.
|
|
1.1 Confidentiality
|
1.1 Rules that ensure only the individuals that have a need for information can access it.
|
|
1.1 Integrity
|
1.1 The content of the data is accurate.
|
|
1.1 Availability
|
1.1 Access to the data is guaranteed.
|
|
Threat
|
1.1 Potential hazard to IT assets and data.
|
|
1.1 Risk
|
1.1 The impact and likelihood of a threat actually happening.
|
|
1.1 Principle of Least Privilege.
|
1.1 Only give enough capability to accomplish required tasks.
|
|
1.1 Social Engineering
|
1.1 Social skills used to obtain access to IT resources.
|
|
1.1 Attack Surface
|
1.1 The amount of vulnerability your Operating System exposes to IT assets.
|
|
1.2 Site Security
|
1.2 Physical security measures taken to protect IT assets.
|
|
1.2 Computer Security
|
1.2 Protection of data and IT assets.
|
|
1.2 Removable devices and drives.
|
1.2 Disabled ports can reduce threats from portable media.
|
|
1.2 Access Control
|
1.2 Management of access to resources based on granting rights and permissions to users and objects.
|
|
1.2 Mobile Device Security
|
1.2 Protections provided for mobile devices.
|
|
1.2 Disable Log on Locally
|
1.2 Denies a user the right to initiate and interactive session directly on the terminal.
|
|
1.2 Key Loggers
|
1.2 Enables the recording of keystrokes without the users knowledge.
|
|
1.3 Browser Settings
|
1.3 Security options enabled within your browsers settings.
|
|
1.3 Zones - Security Zones
|
1.3 Internet, Local Intranet, Trusted and Restricted Sites.
|
|
1.3 Security Zones - Internet
|
1.3 Sets security for sites accessed from outside the local network.
|
|
1.3 Security Zones - Local Intranet
|
1.3 Sets security for sites contained within your LAN
|
|
1.3 Security Zones - Trusted
|
1.3 Sets minimal security for sites you consider safe. By default no site is considered trusted.
|
|
1.3 Security Zones - Restricted Sites
|
1.3 Sets security for sites you do not trust. Security is very high and by default no sites are considered restricted.
|
|
1.3 Secure Web Sites
|
1.3 A website that can secure or provide confidentiality for the data being transferred.
|
|
1.4 Security Types
|
1.4 WEP, WPA, WPA2, AES, 3DES, DES, TKIP
|
|
1.4 Keys
|
1.4 Passphrase, PSK, 802.1x, Certificate
|
|
1.4 WAP
|
1.4 Wireless Access Point
|
|
1.4 SSID
|
1.4 Name of WAP normally broadcast to devices which is sometime disabled. |
|
1.4 MAC Filters
|
1.4 Enables you to explicitly allow or deny access to a WAP through the MAC address. Will not protect against eavesdropping or MAC spoofing.
|
|
1.4 Security Types - WEP
|
1.4 Wired Equivalency Protocol - WEP is a weak encryption standard that can be broken after 500000 frames are transmitted. WEP uses and RC4 key for encryption.
|