Datasafety, Backups, MFA, Passwordmanagers

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/80

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

81 Terms

1
New cards

Backup

A process of making a copy of data to prevent loss due to data corruption, hardware failure, or disasters.

2
New cards

Authorization

The process of granting special rights or permissions to users based on their identity.

3
New cards

Authentication

The first step in verifying a user's identity by providing evidence such as passwords or biometric data.

4
New cards

Multi-Factor Authentication (MFA)

A security system that requires more than one form of verification to gain access to an account.

5
New cards

Incremental Backup

A backup method that saves only the changes made since the last backup, requiring all previous backups for restoration.

6
New cards

Differential Backup

A backup method that saves all changes made since the last full backup, simplifying restoration but using more storage space.

7
New cards

Two-Factor Authentication (2FA)

An electronic authentication method that requires two or more verification methods to access an application or website.

8
New cards

Cloud Backup

A method of saving copies of data to secure online storage to ensure accessibility and protection.

9
New cards

Possession Factor

An authentication method based on something the user has, such as a token or device.

10
New cards

Knowledge Factor

An authentication method based on something the user knows, such as a password or PIN.

11
New cards

Inherent Factor

An authentication method based on biometric traits such as fingerprints or voice recognition.

12
New cards

Program Settings

Configurations in software designed to enhance security and protect against malware.

13
New cards

Password Manager

A tool that securely stores and organizes passwords to facilitate password management.

14
New cards

Hash

A fixed-size summary of data that ensures integrity and authenticity during the data verification process.

15
New cards

Digital Signature

A cryptographic value that is created from a data set and is used to confirm the data's authenticity and integrity.

16
New cards

Storage Medium

Various types of devices (e.g., HDD, SSD, cloud) used to store backup data securely.

17
New cards

Data Security

Measures taken to protect digital information from unauthorized access, corruption, or theft.

18
New cards

Virtual Machine (VM)

An emulation of a computer system that allows the execution of software in an isolated environment.

19
New cards

Urgency of Regular Backups

The importance of consistently performing data backups to prevent significant data loss.

20
New cards

Encryption

The conversion of data into a coded format to prevent unauthorized access.

21
New cards

Data Loss Prevention (DLP)

Strategies to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

22
New cards

Risk Assessment

The process of identifying and evaluating risks to data security within an organization.

23
New cards

Public Key Infrastructure (PKI)

A framework for creating a secure method for exchanging information based on public and private key encryption.

24
New cards

Brute Force Attack

A method used by attackers to gain unauthorized access by systematically trying all possible passwords.

25
New cards

Phishing

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

26
New cards

Automated Backup Tools

Software solutions designed to manage and automate the backup process at scheduled intervals.

27
New cards

Data Recovery

The process of restoring access to lost or corrupted data from backup storage.

28
New cards

Antivirus Software

Programs designed to detect and remove malware from computers and networks.

29
New cards

SSDs and HDDs

Solid State Drives and Hard Disk Drives, two types of storage devices used for data retention.

30
New cards

System Restore

A recovery feature that allows users to revert their system to a previous state without affecting personal files.

31
New cards

Data Backup Frequency

How often backups are performed, typically based on the criticality and frequency of data changes.

32
New cards

Ransomware

A type of malicious software that blocks access to data until a ransom is paid.

33
New cards

Firewall

A network security system that monitors and controls incoming and outgoing network traffic.

34
New cards

Data Security Strategy

A comprehensive plan to protect data against unauthorized access, breaches, and loss, incorporating policies and technologies.

35
New cards

Program Settings

Adjustable options within software applications that define how they operate concerning data security and backup.

36
New cards

Data Backup

The process of creating copies of data to prevent loss due to system failures, disasters, or accidents.

37
New cards

Media Rotation

The practice of systematically changing backup media to enhance data security and ensure up-to-date copies are securely stored.

38
New cards

Autoloaders and Libraries

Devices that automatically load and unload tapes for efficient data backup and recovery processes.

39
New cards

Backup Devices

Hardware used to store backup data, including tape drives, external hard drives, and cloud storage.

40
New cards

Backup Types and Interfaces

Various forms of data backup (e.g., full, incremental, differential) and the connections used to transfer data (like USB and SAS).

41
New cards

Planning the Number of Tape Drives

Determining how many tape drives are needed based on data volume, retrieval speed, and backup frequency.

42
New cards

Planning the Number of Tape Slots

Calculating the total tape slots required in a library to accommodate all necessary backup tapes.

43
New cards

Cloud Backup Tools

Software applications that facilitate the backup of data to cloud storage services.

44
New cards

Personal Backup

Creating data backups for individual users' personal devices, ensuring the protection of personal files and information.

45
New cards

Pros and Cons of Cloud Backup

Advantages include accessibility and cost-effectiveness, while disadvantages may involve dependency on internet access and potential security risks.

46
New cards

Backup Creation Process

The steps taken to generate a data backup, including selecting data, determining backup type, and executing the backup.

47
New cards

Authentication

The first step in verifying a user's identity, requiring evidence such as passwords, IDs, or biometric data.

48
New cards

Authentification

The process of verifying the correctness of the provided identification information during authentication.

49
New cards

Authorization

The step following authentication that grants special rights or permissions based on verified identity.

50
New cards

Comparison of Authentication and Authentification

Authentication establishes identity, while authentification ensures the correctness of that identity.

51
New cards

Permissions in Authorization

Specific rights granted to users, such as read, write, or comments, based on their verified identity.

52
New cards

Role of Biometric Data in Authentication

Biometric data, such as fingerprints or facial recognition, serves as evidence of identity during the authentication process.

53
New cards

Multi-Factor Authentication (MFA)

A method of verifying a user's identity through multiple steps, enhancing security.

54
New cards

Knowledge Factor

An authentication method based on something the user knows, such as a password or security questions.

55
New cards

Possession Factor

An authentication method based on something the user has, such as a physical token or credit card.

56
New cards

Inherent Factor

Authentication based on biometric traits, including fingerprints, facial recognition, or voice identification.

57
New cards

Location Factor

An authentication method that considers the user's physical location to grant or deny access.

58
New cards

Disconnected Tokens

Physical devices not connected to a computer that display authentication data like one-time passwords (OTPs).

59
New cards

Connected Tokens

Devices physically connected to a computer that automatically transmit authentication data.

60
New cards

Software Tokens

Digital authentication tools stored on dedicated hardware, used for two-factor authentication.

61
New cards

Two-Factor Authentication (2FA)

A form of MFA that requires two authentication factors for user access to applications or websites.

62
New cards

Mobile Phone-Based Authentication

A popular authentication method using SMS, apps, or email to verify user identity, with both advantages and disadvantages.

63
New cards

Three-Factor Authentication (3FA)

An elevated level of security that verifies knowledge, possession, and inherent factors for user identification.

64
New cards

Authenticator Apps

Applications like Microsoft Authenticator that enhance security by generating One-Time Passwords (OTPs) and managing multiple account logins.

65
New cards

One-Time Passwords (OTPs)

Temporary, unique codes generated for secure authentication, typically changing every minute.

66
New cards

Browser Extension Password Managers

Extensions for web browsers, like Firefox, that securely store and auto-fill passwords for quick access to accounts.

67
New cards

Biometric Security in Authentication Apps

Security measures that use fingerprint or facial recognition to protect access to authentication applications.

68
New cards

Virtual Machine (VM) Usage for Security

Using VM to isolate potentially risky activities, providing a secure environment separate from the main operating system.

69
New cards

Built-in Password Management Tools

Device-specific features, such as Samsung Pass and iOS Keychain, for securely storing and autofilling passwords and credit card information.

70
New cards

Keepass

A password management application that allows users to store login information securely and suggests stronger passwords.

71
New cards

FIDO (Fast Identity Online)

An open standard for passwordless authentication that enhances security using public key cryptography.

72
New cards

Passwordless Authentication Process

An authentication method that uses cryptographic keys or biometric factors instead of passwords for secure access.

73
New cards

Reasons Why Passwords Are Insecure

Vulnerable to attacks, reuse and weakness of passwords, and human error are key factors decreasing password security.

74
New cards

Public/Private Key Method

An authentication mechanism where the user's private key signs challenges locally, allowing secure verification by the server using the public key.

75
New cards

Advantages of FIDO Authentication

Stronger security, no shared secrets, user convenience, and device-backed authentication are key benefits of using FIDO.

76
New cards

Factors in Authentication

The three main factors in authentication are: 1) Something you know (passwords/PINs), 2) Something you have (security keys/ smart cards), 3) Something you are (biometrics).

77
New cards

PIN Authentication

A secure method where PINs are validated on the user's device, minimizing the risk of interception and providing user-friendly access.

78
New cards

Barriers to Adoption of FIDO

Limited awareness, reliance on traditional passwords, and the need for infrastructure upgrades hinder the widespread use of FIDO technology.

79
New cards

Human Error in Password Security

Mistakes made by users, such as falling for phishing attacks or improperly storing passwords, contribute to security vulnerabilities.

80
New cards

Digital Signing in Authentication

The process of using a private key to sign a challenge sent from a server to verify the user's identity without exposing the private key.

81
New cards

Asymmetric Encryption (Public-Key Cryptography)

A form of encryption that uses a pair of keys: a public key for encryption and a private key for decryption, allowing secure communication without sharing the private key.