1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Biometrics
The use of human identifiers (thumbprint, facial recognition scan, eye scan, as an authentication for devices
MIM Attack
Intercepts communications between two network hosts by impersonating either host
Multifactor Authentication
Using multiple methods of authentication, who you are, what you can do, what you know
Password Guidelines
Rules that include minimum password length, mix of alpha-numerics with special characters, and lockouts for multiple wrong attempts
S/MIME
Protocol for sending digitally signed and encrypted messages
SMTP
Application used to send, receive and relay outgoing emails between senders and users
UPS
"Generator" designed to provide power during a power outage
Zombie
"Infected" device used by hackers to perform a DoS attack
System Administrator
Securing Networks, responding to intrusions, installing backups and firewalls, most important is to monitor and maintain system security
Clearing data
"Wipe" the hard drives or destroy the hard drives
Security Analyst
Implementing security methods, research new threats, typically "white hat" cybersecurity functions, work with law enforcement to investigate potential crimes
Computer Forensics Expert
Work closely with law enforcement to investigate cyber - attacks, need to manipulate data encryption methods, operating systems, programming language
Email Protocols
Read / analyze for errors, issues, Be aware of links or information to fill out, if malware, delete without responding / clicking any links