CST Job Crops Chapter 27

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/147

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

148 Terms

1
New cards

Unauthorized access

When a person accesses resources without permission

2
New cards

Dumpster diving

Generic term for searching garbage for information

3
New cards

Shoulder surfing

Technique for gaining unauthorized access by observing someone’s screen or keyboard to get info

4
New cards

Social engineering

The process of using or manipulating people inside the organization to gain access to its network or facilities

5
New cards

Impersonation

Someone pretending to be someone else to trick you into giving up information, access, or money

6
New cards

Tailgating

Following someone

7
New cards

Mantrap

Small room with a set of two doors used to control access to secure areas. One door must close before the other one opens

8
New cards

Entry control roster

Record of all comings and goings from the building

9
New cards

Telephone scams

Phone call to gain information

10
New cards

According to the book, what is probably the most common form of social engineering?

Telephone scams

11
New cards

Phishing

Act of trying to get people to give their info by pretending to be someone else electronically

12
New cards

Spear phishing

Targeted attacks

13
New cards

DoS

Denial of Service- Attack uses various methods to overwhelm a system, to make it nonfunctional

14
New cards

DDoS

Distributed Denial of Service- Attacks that use many machines simultaneously to assault a system

15
New cards

Data Destruction

Intentionally or accidentally erasing or corrupting data

16
New cards

Why is it important to have less Admin accounts and have them log in as little as possible?

Can do vastly more damage when compromised, amplifying the danger of several other threats

17
New cards

Cable lock

Security device used to physically secure laptops, desktops, or other equipment to a fixed object

18
New cards

What are some ways to protect against blackout, brownouts, and power surges?

UPSs and surge protecters

19
New cards

Environmental controls

Practice of protecting computing equipment from environmental damage by taking measures (air conditioning, ventilation, air filtration, temperature monitoring, and humidity monitoring)

20
New cards

What is the ideal working environment for a computer?

Air is clean, dry, and room temp.

21
New cards

What is the best way to clean dirty electronic devices?

Compressed air or a Non static vacuum

22
New cards

Opinions vary, but according to the book, what is the ideal temperature and relative humidity for computer operation?

22°C/ 72°F and 30-40% humidity

23
New cards

What should you watch for to help with ventilation in a room?

  • Ducts are clear of obstructions

  • Ducts are adjusted

  • Don’t let equipment get closed off from proper ventilation

24
New cards

MSDS

Material Safety Data Sheet- A document that lists the risks, precautions, and clean-up/disposal procedures for any substances you work with regularly

25
New cards

Acess control

Composed of interlinked areas: physical security, authentication, user and groups, and security policies

26
New cards

What are the 5 types of locks that make it harder for an attacker to physically access systems?

  • Lock the doors

  • Cable locks

  • USB locks

  • RJ-45 locks

  • Server locks

27
New cards

RFID

Radio frequency Identification (or smart cards)

28
New cards

Privacy screen

A framed sheet or film that you apply to the front of the screen to reduce viewing angle, making it only to be seen when directly in front of it

29
New cards

Blacklist

Block specific computers, adding their MAC addresses to the ranks of undesired (in MAC filtering or port security)

30
New cards

Whitelist

Pre-specify the only MAC addresses allowed access

31
New cards

Authentication

The process of identifying and granting access to some user trying to access a system

32
New cards

Give an example of two-factor authentication

Something a user knows (password) and something the user has (key fob, code, etc.)

33
New cards

What are the ways CMOS setup utilities can help secure a computer?

Drive lock, intrusion detection, and system access BIOS/UEFI password

34
New cards

Smart cards

Credit-card sized cards with circuitry that can identify the bearer of the card

35
New cards

Security tokens

Devices that store some unique information that the user carries on their person

36
New cards

RSA tokens

Random # generators that are used with usernames and passwords and ensure extra security

37
New cards

Software token

Programming that enables the device to serve as an authentication factor when logging into a secure resource

38
New cards

Biometric Device/locks

Physical, flesh and blood authentication

39
New cards

Retinal scanner

Eye scanner

40
New cards

Principle of least privelege

Accounts should have permission to access only the resources they need and no more

41
New cards

Effective permissions

User’s combined permissions granted by multiple groups

42
New cards

ACL

Access Control List- Form of user and group permissions

43
New cards

Guest account and everyone account

Guest account- meant for temporary or limited access

Everyone account- Security group

44
New cards

Policies

Control permission to perform a given action

45
New cards

How do you protect data “at rest”?

Full-disk data encryption

46
New cards

gpupdate/force

Command-line to update group policy for a specific computer immediately

47
New cards

Local security policy

Set policies on an individual system

48
New cards

OU

Organization units- organize users and devices logically into a folder

49
New cards

Group policy

Controls the settings of multiple network clients with policies

50
New cards

Data classification

System of organizing data according to its sensitivity

51
New cards

Compliance

Members of an organization or company must comply with all of the rules that apply to the organization or company

52
New cards

PII (Personally Identifiable Information)

Any data that can lead back to a specific individual

53
New cards

PHI (Protected Health Information)

Any PII that involves a person’s health status, medical records, and healthcare services they have received

54
New cards

PCI (Payment Card Industry)

Rigorous set of rules for systems that accept, transmit, process, or store credit/debit card payments

55
New cards

GPRD

Fairly new law that defines a broad set of rights and protections of citizens living in countries in the European union

56
New cards

EULA

End User License Agreement- you agree to abide by when you open or install new software obligates you to abide by the use and sharing guidelines stipulated by the software copywrite holder

57
New cards

DRM (Digital Rights Management)

Enforce how you use commercial software

58
New cards

Open source software

Allow you to take the original code and modify it

59
New cards

Closed source software

Can’t modify the source code or make it part of some other software suite

60
New cards

Event Viewer

Read logs created by auditing

61
New cards

Event auditing

When a user logs on

62
New cards

Object Access Auditing

When a user tries to access a certain file or folder

63
New cards

How do you turn on auditing at a local level?

Go to Local Security Policy in Administrative Tools. Select Local policies and click Audit Policy

64
New cards

Incident Reporting

Process of reporting gathered data about a system or problem to supervisors

65
New cards

Where does Event Viewer store its log files?

%SystemRoot%\System32\Config

66
New cards

Acceptable Use Policy (AUP)

Defines what actions employees may or may not perform on company equipment

67
New cards

Incident Response Leader

Who you’ll report any prohibited actions or content directly to your supervisor

68
New cards

Chain of custody

A documented history of who has been in possession on the system

69
New cards

What are the three common rules of the Chain of Custody?

  • Isolate the system

  • Document when you took control and the actions you took

  • Document transfer of custody

70
New cards

Malware

Defines any program or code that’s designed to do something on a system or network that you don’t want done

71
New cards

Virus

A program that replicates and activates

72
New cards

Replication

Make copies of itself or by hiding out in a drives boot sector

73
New cards

Activation

When a virus does something like corrupting data or stealing private information

74
New cards

Worm

Functions like a virus but does not need to attach itself to other programs to replicate

75
New cards

Trojan Horse

Piece of malware that appears or pretends to do one thing while at the same time, does something evil

76
New cards

Keylogger

Records the user’s keystrokes and making that info available to the programmer

77
New cards

Rootkit

Program that takes advantage of very low-level operating system functions to hide itself from antimalware tools

78
New cards

Spyware

Malicious software that can use your computer’s resources to run distributed computing application, keylogger, or worse

79
New cards

Ransomware

Encrypts all the data it can gain access to on a system. Message asking for money to decrypt data

80
New cards

Botnet

Network infected computers under the control of a single person or group

81
New cards

Zombies

Network infected computers

82
New cards

Attack vector

The route the malware takes to get into and infect the system

83
New cards

Zero-day attack

Attack on a vulnerability that wasn’t known to the software developers

84
New cards

Spoofing

Process of pretending to be someone or something you ware not by placing false information into your packets

85
New cards

Man-in-the-middle (MITM)

An attacker taps into communications between 2 systems, covertly interrupting traffic thought to be only between those systems

86
New cards

Session hijacking

Tries to intercept a valid computer session to get authentication information

87
New cards

Brute force

An attempt to crack a password

88
New cards

Dictionary attack

Form of brute force, guesses every word in a dictionary

89
New cards

Hash

Short, fixed length code (mix of numbers and letters) that is created from data

90
New cards

Hash tables

Large lookup tables of passwords and the corresponding hash

91
New cards

Rainbow Tables

Use complicated math to condense dictionary tables with hashed entries dramatically

92
New cards

Pop-ups

Surprise browser windows that appear automatically when you visit a website

93
New cards

Drive-by downloads

Unwanted, unknown, or unplanned file download

94
New cards

What are some ways to forcibly close a window when the x button of the window doesn’t respond?

Pressing ALT-F4 or right clicking the browser windows icon on the taskbar and selecting close

95
New cards

Spam

Unsolicited emails from both legitimate businesses and scammers that account for a huge percentage of traffic on the internet

96
New cards

Rouge anti-malware

Free applications that claim to be anti-malware, but which are actually malware themselves

97
New cards

Patch management

Putting out bug fixes and patches as soon as problems occur

98
New cards

Antivirus program

Protects the PC by working in an active seek and destroy mode and in a passive sentry mode

99
New cards

Virus shields

Passive monitoring of a computer’s activity, checking for viruses only when certain events occur

100
New cards

Signature

Is the code pattern of a known virus