Lesson 16

studied byStudied by 1 person
0.0(0)
get a hint
hint

The process of strengthening the security settings and defenses of network devices, servers, and workstations to protect against unauthorized access, data breaches, and other potential threats.

1 / 10

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

11 Terms

1

The process of strengthening the security settings and defenses of network devices, servers, and workstations to protect against unauthorized access, data breaches, and other potential threats.

Harden Devices

New cards
2

The pre-configured passwords that come with network devices, which should be changed immediately to prevent unauthorized access.

Default Passwords

New cards
3

User accounts on network devices that are not actively used or needed, which should be removed to reduce the risk of unauthorized access.

Unnecessary Logins

New cards
4

A policy that requires users to create complex passwords with a combination of uppercase and lowercase letters, numbers, and special symbols, and to change their passwords regularly to enhance security.

Strong Password Policy

New cards
5

Optional features or services installed on network devices that are not actively used, which should be disabled or removed to minimize the risk of potential attacks.

Unnecessary Services

New cards
6

The process of regularly updating devices with the latest security patches and software updates to address known vulnerabilities and protect against potential exploits.

Patch Management

New cards
7

The ability to physically interact with a device, which can potentially lead to unauthorized access or manipulation. Limiting physical access is crucial for maintaining security.

Physical Access

New cards
8

A network that is deemed safe and authorized, typically the internal network of an organization, from which changes to network devices are allowed.

Trusted Network

New cards
9

The implementation of encryption protocols, such as WPA2 or WPA3, to secure wireless network traffic and prevent unauthorized interception of data.

Encryption for Wireless Networks

New cards
10

The process of monitoring and reviewing access logs and records to identify suspicious activity, detect breaches, and conduct forensic analysis of security incidents.

Audit Access

New cards
11

The creation and storage of copies of device configurations and data to ensure data recovery in the event of misconfiguration, attacks, or device failures.

Backup

New cards

Explore top notes

note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 38 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 105 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 72 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 67 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard57 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard71 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard67 terms
studied byStudied by 24 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard77 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard38 terms
studied byStudied by 42 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard23 terms
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard24 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 284 people
Updated ... ago
5.0 Stars(6)