1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Data-at-rest encryption
Technique that encrypts data stored on physical devices to secure sensitive information.
Length (passwords)
Strong passwords should be a minimum of 12 to 16 characters.
Character types (passwords)
Strong passwords should include a mixture of lowercase letters, uppercase letters, numbers, and symbols.
Uniqueness (passwords)
Using different strong passwords on multiple sites to avoid using the same password.
Complexity (passwords)
Strong passwords possess a high degree of entropy, making them difficult to guess.
Expiration (passwords)
Passwords should expire after a set period to reduce unauthorized access risks.
Administrator BIOS password
Password required to make changes to UEFI BIOS configurations.
User BIOS password
Password that prevents the boot process until entered.
Good BIOS password practices
Include no blank passwords, always require passwords, and avoid automatic logins.
Use screensaver logs
Set a password requirement to unlock a device after inactivity.
Log off when not in use
Encourages users to log out to prevent unauthorized access.
Secure/protect critical hardware
Utilize locking mechanisms to safeguard devices like laptops.
Secure personally identifiable information (PII)
Protect information that identifies a person, use privacy filters, and monitor placement.
Use password managers
Organize and protect passwords in a centralized location.
Restrict user permissions
Limit access rights to users based on their job functions.
Restrict log-in times
Limit user log-in access to specific times to prevent unauthorized access.
Disable guest accounts
Turn off unnecessary accounts that pose a risk to network security.
User failed attempts lockout
Locks accounts after a number of failed login attempts to prevent brute force attacks.
Use timeout/screen lock
Prompts credential re-entry after a period of inactivity.
Apply account expiration dates
Set a time when accounts become inactive for temporary access management.
Change the default administrator’s user account/password
Modify default credentials to prevent unauthorized access.
Disable AutoRun
Prevents automatic execution of programs from removable media to mitigate malware risk.
Disable unused services
Turn off non-essential services to reduce vulnerabilities and free up resources.