Basic System Security Windows User Security (Lec 7)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/169

flashcard set

Earn XP

Description and Tags

Flashcards for reviewing system security concepts in Windows.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

170 Terms

1
New cards

Windows Login Restrictions

Methods to control user access, including time, concurrent logins, and station restrictions.

2
New cards

Time Restrictions

Limiting network access to certain times of the day for user accounts.

3
New cards

Concurrent Logins

Restricting a user to be logged into only one station at a time.

4
New cards

Station Restrictions

Allowing or disallowing specific users from using certain workstations.

5
New cards

Lockout

Freezing an account after a specified number of failed login attempts.

6
New cards

Authentication

Verifying the identity of a user or device.

7
New cards

Authorization

Granting permissions or access rights to authenticated users or devices.

8
New cards

Non-Repudiation

Ensuring there is a trail of where data came from, preventing denial of sending data.

9
New cards

Digital Signatures

A method used to implement non-repudiation, ensuring data integrity and sender authentication.

10
New cards

Man-in-the-middle Attack

An attack where someone intercepts and potentially alters communication between two parties but is prevented by non-repudiation.

11
New cards

Encryption

Scrambling data so that it is not natively readable, protecting it from unauthorized access.

12
New cards

SID (Security Identifier)

A unique identifier for a user account used in encryption keys.

13
New cards

EFS (Encrypting File System)

File encryption available in Windows operating systems.

14
New cards

FileVault

File encryption available in Mac OS X.

15
New cards

TrueCrypt

A third-party encryption software.

16
New cards

Bitlocker

A third-party encryption software.

17
New cards

PGP (Pretty Good Privacy)

A third-party encryption software.

18
New cards

SSL (Secure Sockets Layer)

A protocol used for secure web transactions.

19
New cards

SSH (Secure Shell)

A secure alternative to telnet for remote access.

20
New cards

IPSec (Internet Protocol Security)

A protocol used for secured tunnel (VPN) connections.

21
New cards

Malware

Any malevolent software with a sinister purpose.

22
New cards

Worms

Infectious malware that self-replicates and spreads across networks.

23
New cards

Viruses

Infectious malware that requires user interaction to spread.

24
New cards

Trojans

Malware disguised as something innocuous or desirable.

25
New cards

Backdoors

Malware that bypasses authentication mechanisms for unauthorized access.

26
New cards

Rootkits

Software designed to hide its presence and provide privileged access to a computer.

27
New cards

Spyware

Malware that covertly spies on a user's activities.

28
New cards

Botnets

Networks of compromised systems used to accomplish a common goal.

29
New cards

Adware

Software that collects data to drive targeted advertising.

30
New cards

Spam

Unsolicited bulk messages sent via electronic message systems.

31
New cards

Phishing

Attacks against a person using social engineering to steal credentials.

32
New cards

payload

The malicious action performed by a virus or worm.

33
New cards

Spear Phishing

Targeted phishing attacks, usually specific to an organization.

34
New cards

Pharming

Hacking DNS records to redirect users to a fake website.

35
New cards

DNS

Stands for Domain Name System

36
New cards

Zombie/Drone

A computer controlled by a hacker in a botnet.

37
New cards

Trojan Horse

A malicious program disguised as something safe.

38
New cards

EULA

End User License Agreement.

39
New cards

Firewall

A security device that controls network traffic based on defined rules.

40
New cards

Packet Filtering

Analyzing network packets based on source/destination IP, protocol, and port.

41
New cards

Stateful Packet Inspection (SPI)

Firewall that keeps track of the state of connections.

42
New cards

Application Filtering

Firewall filtering at the application layer, controlling how applications communicate.

43
New cards

Rule Order

The order in which firewall rules are analyzed, from top to bottom.

44
New cards

Allow/Permit

Firewall rule action to allow traffic.

45
New cards

Deny/Drop/Reject

Firewall rule action to block traffic.

46
New cards

Windows Firewall

Software firewall built into the Windows operating system.

47
New cards

Automatic Updates (Anti-Virus)

Regular updates of virus detection signatures.

48
New cards

Scheduled Scans (Anti-Virus)

Regularly planned full system scans for malware.

49
New cards

On-Demand Scans (Anti-Virus)

Scanning specific files for viruses as they are opened.

50
New cards

Heuristic Scanning

Using common sense to detect infections, as opposed to specific known virus signatures.

51
New cards

Email Scanning

Scanning incoming and outgoing emails for viruses.

52
New cards

CERT

Computer Emergency Response Team.

53
New cards

ShieldsUP!

A service used to check open ports on a system.

54
New cards

Netstat

A command-line tool used to display active network connections.

55
New cards

Infectious Software

Software with the goal of replicating itself, examples: viruses and worms

56
New cards

Open Port

A network service that listens for connections, worms focus on these

57
New cards

Payload

Can cause different levels of destruction, often installed by worms

58
New cards

Botnet

Can be bought and sold on black markets

59
New cards

Covertly Spy

Main function of spyware

60
New cards

Targeted Advertising

Main function of Adware

61
New cards

Unsolicited Bulk Messages

Commonly called spam

62
New cards

Social engineering

Phishing example for hacking into a system

63
New cards

Sophistication of malware

Trend that has been increasing over time

64
New cards

Financial Gain

Main motivator for malware

65
New cards

Packet Filtering

Every packet is analyzed and a decision is made, used by a firewall

66
New cards

Packet Filtering

Decisions based on a combination of source, destination and port number.

67
New cards

Generic Packet Filter

Makes forwarding decisions based only on statically configured parameters

68
New cards

Application Firewalls

Talk on behalf of a back-end server

69
New cards

First match algorithm

Applies during rule construction on a firewall

70
New cards

Spyware

Often uses keyloggers

71
New cards

spyware/adware protection

Run anti-spyware software

72
New cards

Antivirus Software

Do not run two or more at the same time

73
New cards

Black Markets

Botnets can be bought and sold here

74
New cards

DDOS

Distributed denial of service

75
New cards

constant vigilance

Required because bad guys are getting better

76
New cards

Network Services

Attacks are focused on these that listen for connections on an open port by worms

77
New cards

Spam Filtering

Due to the amount of spam email systems have this problem

78
New cards

Infectious Worms/Viruses

One of different forms malware can take

79
New cards

Concealment Trojans/backdoors/rootkits

One of different forms malware can take

80
New cards

For Profit Spyware, botnets

One of different forms malware can take

81
New cards

Advertising Spam, Adware

One of different forms malware can take

82
New cards

Propagate Themselves

The main goal of infectious software such as viruses and worms

83
New cards

Browser Settings Too Low

An error that occurs that can trigger a virus in some cases

84
New cards

Application Updates

Important to pay attention to when trying to protect from viruses

85
New cards

Network Traffic

Even without a payload worms can cripple this

86
New cards

Anti-Virus Software

To protect from trojans it is important to install this

87
New cards

Compromised system

Becomes a drone, it can then become part of a botnet

88
New cards

Application Firewall

A special type of firewall that is designed to control how applications communicate

89
New cards

Software Firewalls

Secure different parts of the network and they target different attack vectors

90
New cards

System Security

A never ending effort

91
New cards

Exploits are constantly changing

System security is a never ending effect because of this

92
New cards

tradeoff

There is this between security and usability

93
New cards

Windows User Security

Covers concepts such as windows login restrictions

94
New cards

Basic Security Model

Covers concepts such as Authentication, Authorization, and Non-Repudiation

95
New cards

Data Integrity

A concept related to Non-Repudiation

96
New cards

Authentication Mechanisms

Backdoors are used to bypass

97
New cards

Privileged Access To a Computer

Rootkits provide

98
New cards

Traditional Hacking

What a rootkit can be installed through

99
New cards

Anti-virus software

Install this to protect from viruses, trojans, and rootkits

100
New cards

Compromised

Once a system is this it becomes a drone