Info Assurance Lesson 7 - Protecting a Cybersecurity Domain (Defending Systems and Devices)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Operating System

It plays a critical role in the operation of a computer system and is the target of many attacks.

2
New cards

administrator

An ___________________________ hardens an operating system by modifying the default configuration to make it more secure to outside threats.

3
New cards

Host Hardening

This process includes the removal of unnecessary programs and services.

4
New cards

patches,

updates

Another critical requirement of hardening operating systems is the application of security __________________ and ___________________.

5
New cards

antimalware

It is important to protect computers and mobile devices using reputable ____________________________ software

6
New cards

Patch Management

It is the code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack.

7
New cards

service pack

Manufacturers combine patches and upgrades into a comprehensive update application called a _____________________________.

8
New cards

Host-based Firewalls / software firewall

It is a program that runs on a computer to allow or deny traffic between the computer and other connected computers.

9
New cards

Host-based Firewalls / software firewall

It applies a set of rules to data transmissions through inspection and filtering of data packets.

10
New cards

Host Intrusion Detection Systems (HIDS)

It is software that runs on a host computer that monitors suspicious activity.

11
New cards

Virtual Private Network (VPN)

When connecting to the local network and sharing files, the communication between computers remains within that network. To communicate and share resources over a network that is not secure, users employ a _____________________________________________.

12
New cards

Virtual Private Network (VPN)

is a private network that connects remote sites or users together over a public network, like the Internet

13
New cards

Wired Equivalent Privacy (WEP)

One of the most important components of modern computing are mobile devices.

14
New cards

Wired Equivalent Privacy (WEP)

It is one of the first widely used Wi-Fi security standards. It provides authentication and encryption protections

15
New cards

WPA and WPA2.

The next major improvement to wireless security was the introduction of ________________________

16
New cards

Wi-Fi Protected Access (WPA)

was the computer industry's response to the weakness of the WEP standard.

17
New cards

Mutual Authentication

The imposter can launch a man-in-the-middle attack which is very difficult to detect and can result in stolen login credentials and transmitted data. To prevent rogue access points, the computer industry developed ____________________________________________________.

18
New cards

Mutual Authentication

It is a process or technology in which both entities in a communications link authenticate to each other.

19
New cards

two-way authentication

What is the other term for Mutual Authentication?

20
New cards

File Access Control

This consists of permissions that limit folder or file access for an individual or for a group of users.

21
New cards

File Encryption

It is a tool used to protect data stored in the form of files.

22
New cards

Encryption

transforms data using a complicated algorithm to make it unreadable.

23
New cards

True

True or false:

Software programs can encrypt files, folders, and even entire drives

24
New cards

data backup

It stores a copy of the information from a computer to removable backup media.

25
New cards

True

True or false:

Backing up data is one of the most effective ways of protecting against data loss.

26
New cards

Content control

This software restricts the content that a user can access with a web browser over the Internet.

27
New cards

Content control

It can block sites that contain certain types of material such as pornography or controversial religious or political content.

28
New cards

Disk Cloning and Deep Freeze

With this, many third party applications are available to restore a system back to a default state. This allows the administrator to protect the operating system and configuration files for a system.

29
New cards

Disk cloning

It copies the contents of the computer's hard disk to an image file.

30
New cards

Deep Freeze

It "freezes" the hard drive partition. When a user restarts the system, the system reverts to its frozen configuration. The system does not save any changes that the user makes, so any applications installed or files saved are lost when the system restarts

31
New cards

cable locks,

telecommunication,

cages

There are several methods of physically protecting computer equipment:

- Use ______________________.

- Keep _________________________________ rooms locked.

- Use security __________________ around equipment.

32
New cards

Logout Timers

This is helpful when an employee gets up and leaves his computer to take a break. If the employee does not take any action to secure his workstation, any information on that system is vulnerable to an unauthorized user.

33
New cards

Logout Timers

It will make sure that the employee's account is logged out after a certain amount of time to make sure no one will sneak to his/her computer without permission

34
New cards

Idle Timeout and Screen Lock

Employees may or may not log out of their computer when they leave the workplace. So what are the best thing to do?

35
New cards

Idle Timeout and Screen Lock

it is a security best practice to configure an idle timer that will automatically lock the screen and sometimes may automatically logout the user.

36
New cards

Login Times

In some situations, an organization may want employees to log in during specific hours, such as 7 a.m. to 6 p.m.

37
New cards

GPS Tracking

It uses satellites and computers to determine the location of a device. This technology is a standard feature on smartphones that provides real-time position tracking.

38
New cards

100

GPS tracking can pinpoint a location within ____ meters

39
New cards

Radio frequency identification (RFID)

It uses radio waves to identify and track objects. Its inventory systems use tags attached to all items that an organization wants to track.