• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Seperation of Duties

No one person has all of the details


-like half of a safe combination

Dual Control

Two people must be present to perform the business function


-two keys to launch a missle

Least privilege

You only get rights necessary to perform the job


-How many admins are on your network


-Mgmt gets to choose the rights


-Security gets to administer it

rootkits

a type of malicious software that is activated each time your system boots up

-gets in kernel


-impossible to see


-hides in the OS

Social Engineering

a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures

Shoulder Surfing

the practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information.

Malware

Malicious Software


-spamming


-Extortion


-Participate in a group


-Virus and worm

Phishing

Social engineering with spoofing

A mail message from someone you trust takes you to a fake website to get you to put in your username and pw



Spear Phishing

Target people directly

Virus

Pieces of code that reproduces itself, can reproduce across the network

Worms

Can replicate itself without user intervention



Password Complexity

Make Pw strong


-No single words


-No obvious pw


-mix upper and lower case


-Use special charcters


A strong pw is at least 8 characters


Never disable pw

Workstation Best Pactices

Password Complexity


Restricting Permissions


Disabling unnecessary accounts


Desktop Security

Desktop Security

Disable Auto Run - consider autoplay


Require a screensaver pw

Low-level formatting

-Provided at the factory


-Not Possible by the user

High-level formatting

-Sets up the file system


-Installs a boot sector


-"Quick format"


-does not erase data!!


-Can be recovered with the right software

Sdelete

File level removal


-Securely delete files

dban

rewrites the entire drive so that no one has access to it

Physically destroy drive

Shred


Drill


Degauss

NAC

Network Acces Control


-802.1x controls


-You can't communicate unless you are authenticated