BIOS Security 3.4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Administrator Password

Required to access and modify BIOS/UEFI settings; often called the supervisor or setup password.

2
New cards

User Password

Required to boot the OS; may be called system or power-on password. Can be used alone or with an admin password for layered security.

3
New cards

BIOS/UEFI Password Limitations

Offers limited protection; often bypassed by removing the CMOS battery or using a jumper to reset.

4
New cards

Password Tampering Indicator

If an admin password disappears unexpectedly, it may indicate unauthorized access.

5
New cards

Chassis Lock

Prevents case access to avoid physical tampering, like clearing BIOS passwords.

6
New cards

Chassis Intrusion Detection

System detects when the case is opened via an internal switch, triggering alerts in BIOS/UEFI or at boot.

7
New cards

Drive Locking

Requires a password to access the hard disk. Password is stored on the drive, not the motherboard.

8
New cards

Drive Locking: Passwords

Includes user and master passwords, set via BIOS/UEFI. Stored securely and can’t be read from the disk.

9
New cards

Drive Locking: Mobility

Passwords stay with the drive; moving it to another PC still requires the password.

10
New cards

Drive Locking: Format Protection

You can't remove the password by formatting the drive.

11
New cards

Drive Locking: Troubleshooting

If both user and master passwords are lost, data access is impossible.

12
New cards

Drive Locking: Incorrect Attempts

Most systems limit incorrect password tries before requiring a reboot.

13
New cards

Default Master Passwords

Some systems ship with a non-public master password, not available from the manufacturer.

14
New cards

Trusted Platform Module (TPM)

Motherboard chip used for cryptographic key generation, storage, and verification.

15
New cards

TPM Initialization

Configured in BIOS/UEFI; requires owner password for secure management.

16
New cards

TPM: Hardware Verification

Creates cryptographic keys to detect hardware changes and block unauthorized booting.

17
New cards

TPM: Encryption Key Storage

Used by applications (e.g., BitLocker) to securely store encryption keys.

18
New cards

Full Disk Encryption via BIOS/UEFI

Encrypts entire hard drive without OS software. Requires a key stored externally for recovery.

19
New cards

LoJack

Anti-theft tool embedded in firmware. Tracks system via GPS and checks theft reports.

20
New cards

LoJack: Reporting and Recovery

Periodically sends location to vendor server. Helps locate and recover stolen systems.

21
New cards

LoJack: Software Deployment

Motherboard chip contains only a downloader; full service installs in Windows.

22
New cards

UEFI Digital Signature

Prevents unauthorized firmware changes by requiring vendor-signed updates.

23
New cards

Secure Boot

Prevents OS booting unless digitally signed; protects against rootkits and unauthorized OS loading.

24
New cards

Rootkit Protection via Secure Boot

Blocks malware that tries to load before the OS and anti-malware tools.

25
New cards

Fast Startup in Windows

Reduces boot time but may prevent normal BIOS/UEFI access.

26
New cards

Bypassing Fast Startup

Hold Shift while selecting Restart to access UEFI settings.

27
New cards

BIOS Access Keys

Common entry keys: Del, F2, F10, Esc (varies by manufacturer).

28
New cards

Interrupting Boot Process

Boot failing 3 times can trigger recovery mode for BIOS/UEFI access.

29
New cards

Backing Up BIOS Configurations

Save settings by exporting config, screenshots, or notes.

30
New cards

Primary Boot Sequence

Determines boot device order: HDD, SSD, USB, network, etc.

31
New cards

USB Port Restrictions in BIOS

Used in secure environments to prevent data theft or malware via USB devices.

32
New cards

Devices Section in BIOS

Enable or disable hardware like USB ports, NICs, and more.

33
New cards

Clearing BIOS Settings (CMOS Reset)

Use a jumper or remove CMOS battery to reset BIOS, including passwords.

34
New cards

Persistent Memory

Non-volatile memory with RAM-like speed, retains data without power.

35
New cards

Versatile Memory

Flexible memory tech combining features of volatile and non-volatile storage.

36
New cards

HSM (Hardware Security Module)

Hardware device for secure encryption key management and backup.

37
New cards

Cryptographic Accelerators

Hardware features that speed up encryption/decryption tasks.