1/80
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Backup
A process of making a copy of data to prevent loss due to data corruption, hardware failure, or disasters.
Authorization
The process of granting special rights or permissions to users based on their identity.
Authentication
The first step in verifying a user's identity by providing evidence such as passwords or biometric data.
Multi-Factor Authentication (MFA)
A security system that requires more than one form of verification to gain access to an account.
Incremental Backup
A backup method that saves only the changes made since the last backup, requiring all previous backups for restoration.
Differential Backup
A backup method that saves all changes made since the last full backup, simplifying restoration but using more storage space.
Two-Factor Authentication (2FA)
An electronic authentication method that requires two or more verification methods to access an application or website.
Cloud Backup
A method of saving copies of data to secure online storage to ensure accessibility and protection.
Possession Factor
An authentication method based on something the user has, such as a token or device.
Knowledge Factor
An authentication method based on something the user knows, such as a password or PIN.
Inherent Factor
An authentication method based on biometric traits such as fingerprints or voice recognition.
Program Settings
Configurations in software designed to enhance security and protect against malware.
Password Manager
A tool that securely stores and organizes passwords to facilitate password management.
Hash
A fixed-size summary of data that ensures integrity and authenticity during the data verification process.
Digital Signature
A cryptographic value that is created from a data set and is used to confirm the data's authenticity and integrity.
Storage Medium
Various types of devices (e.g., HDD, SSD, cloud) used to store backup data securely.
Data Security
Measures taken to protect digital information from unauthorized access, corruption, or theft.
Virtual Machine (VM)
An emulation of a computer system that allows the execution of software in an isolated environment.
Urgency of Regular Backups
The importance of consistently performing data backups to prevent significant data loss.
Encryption
The conversion of data into a coded format to prevent unauthorized access.
Data Loss Prevention (DLP)
Strategies to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
Risk Assessment
The process of identifying and evaluating risks to data security within an organization.
Public Key Infrastructure (PKI)
A framework for creating a secure method for exchanging information based on public and private key encryption.
Brute Force Attack
A method used by attackers to gain unauthorized access by systematically trying all possible passwords.
Phishing
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
Automated Backup Tools
Software solutions designed to manage and automate the backup process at scheduled intervals.
Data Recovery
The process of restoring access to lost or corrupted data from backup storage.
Antivirus Software
Programs designed to detect and remove malware from computers and networks.
SSDs and HDDs
Solid State Drives and Hard Disk Drives, two types of storage devices used for data retention.
System Restore
A recovery feature that allows users to revert their system to a previous state without affecting personal files.
Data Backup Frequency
How often backups are performed, typically based on the criticality and frequency of data changes.
Ransomware
A type of malicious software that blocks access to data until a ransom is paid.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic.
Data Security Strategy
A comprehensive plan to protect data against unauthorized access, breaches, and loss, incorporating policies and technologies.
Program Settings
Adjustable options within software applications that define how they operate concerning data security and backup.
Data Backup
The process of creating copies of data to prevent loss due to system failures, disasters, or accidents.
Media Rotation
The practice of systematically changing backup media to enhance data security and ensure up-to-date copies are securely stored.
Autoloaders and Libraries
Devices that automatically load and unload tapes for efficient data backup and recovery processes.
Backup Devices
Hardware used to store backup data, including tape drives, external hard drives, and cloud storage.
Backup Types and Interfaces
Various forms of data backup (e.g., full, incremental, differential) and the connections used to transfer data (like USB and SAS).
Planning the Number of Tape Drives
Determining how many tape drives are needed based on data volume, retrieval speed, and backup frequency.
Planning the Number of Tape Slots
Calculating the total tape slots required in a library to accommodate all necessary backup tapes.
Cloud Backup Tools
Software applications that facilitate the backup of data to cloud storage services.
Personal Backup
Creating data backups for individual users' personal devices, ensuring the protection of personal files and information.
Pros and Cons of Cloud Backup
Advantages include accessibility and cost-effectiveness, while disadvantages may involve dependency on internet access and potential security risks.
Backup Creation Process
The steps taken to generate a data backup, including selecting data, determining backup type, and executing the backup.
Authentication
The first step in verifying a user's identity, requiring evidence such as passwords, IDs, or biometric data.
Authentification
The process of verifying the correctness of the provided identification information during authentication.
Authorization
The step following authentication that grants special rights or permissions based on verified identity.
Comparison of Authentication and Authentification
Authentication establishes identity, while authentification ensures the correctness of that identity.
Permissions in Authorization
Specific rights granted to users, such as read, write, or comments, based on their verified identity.
Role of Biometric Data in Authentication
Biometric data, such as fingerprints or facial recognition, serves as evidence of identity during the authentication process.
Multi-Factor Authentication (MFA)
A method of verifying a user's identity through multiple steps, enhancing security.
Knowledge Factor
An authentication method based on something the user knows, such as a password or security questions.
Possession Factor
An authentication method based on something the user has, such as a physical token or credit card.
Inherent Factor
Authentication based on biometric traits, including fingerprints, facial recognition, or voice identification.
Location Factor
An authentication method that considers the user's physical location to grant or deny access.
Disconnected Tokens
Physical devices not connected to a computer that display authentication data like one-time passwords (OTPs).
Connected Tokens
Devices physically connected to a computer that automatically transmit authentication data.
Software Tokens
Digital authentication tools stored on dedicated hardware, used for two-factor authentication.
Two-Factor Authentication (2FA)
A form of MFA that requires two authentication factors for user access to applications or websites.
Mobile Phone-Based Authentication
A popular authentication method using SMS, apps, or email to verify user identity, with both advantages and disadvantages.
Three-Factor Authentication (3FA)
An elevated level of security that verifies knowledge, possession, and inherent factors for user identification.
Authenticator Apps
Applications like Microsoft Authenticator that enhance security by generating One-Time Passwords (OTPs) and managing multiple account logins.
One-Time Passwords (OTPs)
Temporary, unique codes generated for secure authentication, typically changing every minute.
Browser Extension Password Managers
Extensions for web browsers, like Firefox, that securely store and auto-fill passwords for quick access to accounts.
Biometric Security in Authentication Apps
Security measures that use fingerprint or facial recognition to protect access to authentication applications.
Virtual Machine (VM) Usage for Security
Using VM to isolate potentially risky activities, providing a secure environment separate from the main operating system.
Built-in Password Management Tools
Device-specific features, such as Samsung Pass and iOS Keychain, for securely storing and autofilling passwords and credit card information.
Keepass
A password management application that allows users to store login information securely and suggests stronger passwords.
FIDO (Fast Identity Online)
An open standard for passwordless authentication that enhances security using public key cryptography.
Passwordless Authentication Process
An authentication method that uses cryptographic keys or biometric factors instead of passwords for secure access.
Reasons Why Passwords Are Insecure
Vulnerable to attacks, reuse and weakness of passwords, and human error are key factors decreasing password security.
Public/Private Key Method
An authentication mechanism where the user's private key signs challenges locally, allowing secure verification by the server using the public key.
Advantages of FIDO Authentication
Stronger security, no shared secrets, user convenience, and device-backed authentication are key benefits of using FIDO.
Factors in Authentication
The three main factors in authentication are: 1) Something you know (passwords/PINs), 2) Something you have (security keys/ smart cards), 3) Something you are (biometrics).
PIN Authentication
A secure method where PINs are validated on the user's device, minimizing the risk of interception and providing user-friendly access.
Barriers to Adoption of FIDO
Limited awareness, reliance on traditional passwords, and the need for infrastructure upgrades hinder the widespread use of FIDO technology.
Human Error in Password Security
Mistakes made by users, such as falling for phishing attacks or improperly storing passwords, contribute to security vulnerabilities.
Digital Signing in Authentication
The process of using a private key to sign a challenge sent from a server to verify the user's identity without exposing the private key.
Asymmetric Encryption (Public-Key Cryptography)
A form of encryption that uses a pair of keys: a public key for encryption and a private key for decryption, allowing secure communication without sharing the private key.