All Sec+ Words

studied byStudied by 16 people
5.0(1)
Get a hint
Hint

cellular telephony

1 / 335

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

336 Terms

1

cellular telephony

A communications network in which the coverage area is divided into hexagon-shaped cells

New cards
2

infrared

Light that is next to visible light on the light spectrum and was once used for data communications.

New cards
3

Universal Serial Bus (USB) connectors

A port on mobile devices used for data transfer.

New cards
4

Bring your own device (BYOD)

Allows users to use their own personal mobile devices for business purposes.

New cards
5

Corporate owned, personally enabled (COPE)

Employees choose from a selection of company-approved devices.

New cards
6

Choose your own device (CYOD)

Employees choose from a limited selection of approved devices but pay the upfront cost of the device while the business owns the contract.

New cards
7

Virtual desktop infrastructure (VDI)

Stores sensitive applications and data on a remote server that is accessed through a smartphone.

New cards
8

Corporate owned

A mobile device that is purchased and owned by the enterprise.

New cards
9

firmware over-the-air (OTA) updates

Mobile operating system patches and updates that are distributed as an over-the-air (OTA) update.

New cards
10

Global Positioning System (GPS)

A satellite based navigation system that provides information to a GPS receiver anywhere on (or near) the Earth where there is an unobstructed line of sight to four or more GPS satellites.

New cards
11

geolocation

The process of identifying the geographical location of a device.

New cards
12

GPS tagging (Geo tagging)

Adding geographical identification data to media such as digital photos taken on a mobile device

New cards
13

tethering

Using a mobile device with an active Internet connection to share that connection with other mobile devices through Bluetooth or Wi-Fi.

New cards
14

USB On-the-Go (OTG)

A specification that allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access.

New cards
15

external media access

A device with a USB connection that can function as a host (to which other devices may be connected such as a USB flash drive) to access media.

New cards
16

malicious flash drive

A USB flash drive infected with malware.

New cards
17

Malicious USB cable

A USB cable embedded with a Wi-Fi controller that can receive commands from a nearby device to send malicious commands to the connected mobile device.

New cards
18

Hotspot

A location where users can access the Internet with a wireless signal.

New cards
19

jailbreaking

Circumventing the installed built-in limitations on Apple iOS devices.

New cards
20

Rooting

Circumventing the installed built-in limitations on Android devices.

New cards
21

third party app store

A site from which unofficial apps can be downloaded.

New cards
22

sideloading

Downloading unofficial apps, typically through jailbreaking/rooting

New cards
23

custom firmware

Firmware that is written by users to run on their own mobile devices.

New cards
24

carrier unlocking

Uncoupling a phone from a specific wireless provider.

New cards
25

short message service (SMS)

Text messages of a maximum of 160 characters.

New cards
26

multimedia messaging service (MMS)

Text messages in which pictures, video, or audio can be included.

New cards
27

rich communication services (RCS)

Mobile device communication which can convert a texting app into a live chat platform and supports pictures, videos, location, stickers, and emojis.

New cards
28

personal identification number (PIN)

A passcode made up of numbers only.

New cards
29

screen lock

A security setting that prevents a mobile device from being accessed until the user enters the correct passcode permitting access.

New cards
30

context aware authentication

Using a contextual setting to validate a user.

New cards
31

full disk encryption

The encryption of all user data on a mobile device.

New cards
32

storage segmentation

Separating business data from personal data on a mobile device.

New cards
33

containerization

Separating storage into separate business and personal "containers."

New cards
34

remote wipe

A technology used to erase sensitive data stored on the mobile device.

New cards
35

mobile device management (MDM)

Tools that allow a mobile device to be managed remotely by an organization.

New cards
36

geofencing

Using the mobile device's GPS to define geographical boundaries where an app can be used.

New cards
37

push notification services

Sending SMS text messages to selected users or groups of users.

New cards
38

mobile application management (MAM)

Tools that are used for distributing and controlling access to apps on mobile devices.

New cards
39

Content Management

Tools used to support the creation and subsequent editing and modification of digital content by multiple employees.

New cards
40

mobile content management (MCM)

A system provides content management to mobile devices used by employees in an enterprise.

New cards
41

unified endpoint management (UEM)

A group or class of software tools has a single management interface for mobile devices as well as computer devices.

New cards
42

embedded system

Computer hardware and software contained within a larger system that is designed for a specific function.

New cards
43

raspberry Pi (types of embedded devices)

A low-cost credit-card-sized computer motherboard.

New cards
44

arduino

A controller for other devices.
- has an eight-bit microcontroller instead of a 64-bit microprocessor on the Raspberry Pi

- a limited amount of RAM, and no operating system

New cards
45

field-programmable gate array (FPGA)

A hardware integrated circuit (IC) that can be programmed by the user to carry out one or more logical operations

New cards
46

system on a chip (SoC)

A single microprocessor chip on which all the necessary hardware components are contained.

New cards
47

real-time operating system (RTOS)

An operating system that is specifically designed for an SoC in an embedded system.

New cards
48

smart meters

Digital meters that measure the amount of utilities consumed.

New cards
49

Industrial control systems (ICSs)

Systems that control locally or at remote locations by collecting, monitoring, and processing real-time data to control machines

New cards
50

supervisory control and data acquisition (SCADA) system

A system that controls multiple industrial control systems (ICS).

New cards
51

heating, ventilation, and air conditioning (HVAC) (specialized systems)

Environmental systems that provide and regulate heating and cooling.

New cards
52

multifunctional printer (MFP)

A device that combines the functions of a printer, copier, scanner, and fax machine.

New cards
53

voice over IP (VoIP)

A technology that uses a data-based IP network to add digital voice clients and new voice applications onto the IP network.

New cards
54

Internet of Things (IoT)

Connecting any device to the Internet for the purpose of sending, receiving, and using data

New cards
55

constraints

Limitations that make security a challenge for embedded systems and specialized devices.

New cards
56

Geographical considerations

in context based firewall rules, determines rules depending on the geographical location of the device

New cards
57

Content/url filtering

assesses web pages based on content then puts them on white list or black list

New cards
58

Stateless packet filtering

examines packet only by the firewall rules

New cards
59

Stateful packet filtering

examines packet by firewall rules and if internal device requested it b/c packet may be unsolicited

New cards
60

Open source firewall

firewall that is freely available, built on secure foundations

New cards
61

Proprietary firewalls

firewall that is owned by a separate entity

New cards
62

Hardware firewall

specialized hardware device for firewall purposes. Has more features, more secure but more expensive

New cards
63

Software firewall

a firewall that is installed into a device. can become compromised if host is also compromised

New cards
64

Host-based

software firewall, only protects host that it is installed on 

New cards
65

Virtual firewall

for cloud based environments where appliance firewalls are impractical

New cards
66

Web application firewall (WAF)

either hardware or software, examines web applications using HTTP. Blocks sites and attacks such as SQL injections and XSS

New cards
67

Network address translation gateway

a NAT for the cloud

New cards
68

Next generation firewall (NGFW)

can filter packets based on application and uses deep packet inspection to examine payloads to see if they are carrying malware. 

New cards
69

Unified threat management (UTM)

combines several security functions into one

New cards
70

Forward proxy

proxy that gives the user anonymity by caching previous web requests and forwarding them to the user or forwarding the users request to the external server

New cards
71

Reverse proxy

proxy that gives the internal server anonymity by forwarding external requests to the internal device

New cards
72

Honeypots

a computer used to deflect an attacker’s attention away from a legitimately vulnerable device and to discover their security tactics.

New cards
73

Honeyfiles

not valuable files that are meant to attract attackers

New cards
74

Fake telemetry

fake version of telemetry (data on how software in managed in a company). Used to lure attackers in.

New cards
75

Honeynet

network with vulnerabilities setup with the same intentions of a honeypot

New cards
76

DNS sinkholes

when a DNS server purposefully gives the user a false IP address in order to redirect them to a “sinkhole” which assists network administrators in finding infected users

New cards
77

IDS vs IPS

IDS (Intrusion detection system) detects attacks as it happens while an IPS (Intrusion protection system) attempts to block the attack.

New cards
78

Inline IPS/IDS system

IPS/IDS system that is connected to the network and monitors traffic as it happens

New cards
79

Passive (IDS/IPS) system

connected to port on switch, receives copy of network traffic

New cards
80

Out-of-band management

connecting through a separate management interface (physical connection, console router for enterprise and multiple devices) to access an otherwise inaccessible (off, sleep mode, etc) device (usually IDS systems).

New cards
81

Anomaly monitoring

a form of IPS/IDS monitoring that includes establishing a “baseline” of regular behavior on the network to then compare on-going behavior with that baseline to detect anomalies in security. Results in several false positives and attacks can happen before a baseline is established.

New cards
82

Signature-based monitoring

a form of monitoring that recognizes a pattern in an attack (traffic, activity, or transactions) and uses a database of these patterns (signatures) to detect incoming malware. Similar to anti-virus.

New cards
83

Behavioral monitoring

a form of IPS/IDS monitoring that analyzes the behaviors of programs and processes and alerts the user when something is abnormal

New cards
84

Heuristic monitoring

a form of IPS/IDS monitoring that follows the philosophy of: Will this be harmful if it is allowed to execute? Heuristic means to find/discover. Algorithm is figuring out if the application should be executed.

New cards
85

Network Intrusion Detection System (NIDS)

detects network intrusions

New cards
86

Network Intrusion Prevention System (NIPS)

system that prevents network intrusions

New cards
87

Network hardware security module

if a company has many HSMs they can use this in the form of a trusted network computer that can encrypt, exchange keys, and generate random numbers.

New cards
88

Baseline configuration

a set of configuration settings that are regarded as the standard for all devices. It is the starting point of configuration and the bare minimum.

New cards
89

Standard naming conventions

Establishing a standard for the way devices should be named. Avoids confusion.

New cards
90

Internet protocol schema

standard for setting up IP addresses. Avoids confusion, waste of space, and helps when troubleshooting

New cards
91

Diagram

mapping network devices can help with troubleshooting and when a new device is connected

New cards
92

Access Control List

rules that either grant or deny access to certain assets. Network ACLs are the most common. Prevents IP spoofing.

New cards
93

Virtual Private Network (VPN)

allowing users to access the public network (the Internet) as if it were a private network. Does this by encrypting the tunnel of communciation

New cards
94

remote access VPN

User-to-LAN connection for remote users

New cards
95

site-to-site VPN

VPN connection setup between multiple networks. Ex: central office, branch1, branch2 etc.

New cards
96

always-on VPNs

users always stay connected to VPN

New cards
97

full tunnel

a form of VPN tunneling where all traffic is sent to the VPN concentrator where it is protected.

New cards
98

split-tunnel

traffic is “split” vulnerable and non-vulnerable. Vulnerable is sent to VPN concentrator.

New cards
99

Layer 2 Tunneling Protocol (L2TP)

VPN protcol that does not have encryption by default, so paired with IPsec

New cards
100

HTML 5

can be used as “clientless” VPN so no other software needs to be installed

New cards

Explore top notes

note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 26 people
Updated ... ago
4.3 Stars(3)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 31537 people
Updated ... ago
4.8 Stars(233)

Explore top flashcards

flashcards Flashcard183 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard54 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(4)
flashcards Flashcard56 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard27 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard53 terms
studied byStudied by 35 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard23 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard64 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard107 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(3)