Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Seperation of Duties |
No one person has all of the details -like half of a safe combination |
|
Dual Control |
Two people must be present to perform the business function -two keys to launch a missle |
|
Least privilege |
You only get rights necessary to perform the job -How many admins are on your network -Mgmt gets to choose the rights -Security gets to administer it |
|
rootkits |
a type of malicious software that is activated each time your system boots up
-gets in kernel -impossible to see -hides in the OS |
|
Social Engineering |
a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures
|
|
Shoulder Surfing |
the practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information.
|
|
Malware |
Malicious Software -spamming -Extortion -Participate in a group -Virus and worm |
|
Phishing |
Social engineering with spoofing
A mail message from someone you trust takes you to a fake website to get you to put in your username and pw |
|
Spear Phishing |
Target people directly |
|
Virus |
Pieces of code that reproduces itself, can reproduce across the network |
|
Worms |
Can replicate itself without user intervention |
|
Password Complexity |
Make Pw strong -No single words -No obvious pw -mix upper and lower case -Use special charcters A strong pw is at least 8 characters Never disable pw |
|
Workstation Best Pactices |
Password Complexity Restricting Permissions Disabling unnecessary accounts Desktop Security |
|
Desktop Security |
Disable Auto Run - consider autoplay Require a screensaver pw |
|
Low-level formatting |
-Provided at the factory -Not Possible by the user |
|
High-level formatting |
-Sets up the file system -Installs a boot sector -"Quick format" -does not erase data!! -Can be recovered with the right software |
|
Sdelete |
File level removal -Securely delete files |
|
dban |
rewrites the entire drive so that no one has access to it |
|
Physically destroy drive |
Shred Drill Degauss |
|
NAC |
Network Acces Control -802.1x controls -You can't communicate unless you are authenticated |