Shared Flashcard Set

Details

A+ Book 9
Securing Systems
36
Computer Science
Professional
07/24/2013

Additional Computer Science Flashcards

 


 

Cards

Term
Network Based Attack:
Social Engineering Attack
Definition
hacker tries to trick a user or admin to divulge sensitive information through social contact.

Hacker uses that info to compromise the system or network
Term
Network Based Attack:
Password Attacks:
Dictionary
Definition
Hacker has 2 files:
- all user names
- every word in the dictionary + others

tries every word in dictionary+ to crack each account
Term
Network Based Attack:
Password Attacks:
Brute Force
Definition
hacker uses a program that tries to figure out your password with different combos of characters
Term
Network Based Attack:
Denial of Service (DoS) Attack
Definition
designed to cause a system to be so busy that it cannot service a real request from a client.

have a firewire installed as well as updated patches to prevent this attack
Term
Network Based Attack:
Spoofing attack
Definition
hacker modifies the source address of a network packet (piece of info sent out on the network).

3 types:
- MAC
- IP
- E-mail

implement encryption and authentication services on the network
Term
Network Based Attack:
Eavesdropping Attack
Definition
Hacker uses some sort of packet sniffer program to see all the traffic on a network.

utilized to find login passwords or monitor activities

To protect, encrypt network traffic
Term
Network Based Attack:
Man-in-the-middle Attack
Definition
hacker monitoring traffic but also intercepting data, and possibly modifying the data, then sending out the result.

to protect:
- restrict access to the network, implement encryption and authentication services on the network
Term
Network Based Attack:
Session hijacking Attack
Definition
similar to Man-in-the-middle, instead the hacker poses as the party it was supposed to be sent to and hijacks the conversation.

Protect:
- restrict access to the network and implement encryption and authentication services
Term
Physical Security Best Practices
Definition
- Secure server placement
- Lock the workstation
- Disable boot devices
- Set CMOS password
- Disable network ports
- Use a lockdown cable
Term
Encryption:
Secure Sockets Layer (SSL)
Definition
encrypts different types of internet traffic by applying digital certificates

Digital Certificate:
- contains the key that is used to encrypt and decrypt the traffic
Term
Encryption:
Internet Protocol Security (IPSec)
Definition
Can encrypt all TCP/IP traffic between systems.

unlikely solution for Websites but great for encrypting traffic on your network
Term
Encryption:
Virtual Private Network (VPN)
Definition
Allows a user to connect across the Internet to a remote network and send info between her system and the office network securely.

creates a security tunnel that is encrypted.
Term
Full Backup
Definition
Copies files that you select, and clears the archive bit on any file that is backed up -- essentially recording the fact that the file has been backed up
Term
Differential Backup
Definition
- Copies files that have been changed
- Does not clear archive bit (no record files have been backed up)
- Next time it backs up, the files will be backed up again
Term
Incremental Backup
Definition
- Copies any file that has changed and then clears archive bit on those files
- Files will not be backed up again unless they were changed since last backup
Term
RAID (Redundant Array of Inexpensive Disks)Level 0 (striped volume)
Definition
- Writes different parts of the data to different disks at the same time
- Benefit: get performance benefit by writing data at the same time to multiple disks, taking less time to read/write file. (data is split up, not duplicated)
- not a redundant solution
Term
RAID (Redundant Array of Inexpensive Disks)Level 1 (mirrored volume)
Definition
- Duplicates the data stored on one disk to another.
- If one fails the other disk has a copy
Term
RAID (Redundant Array of Inexpensive Disks) Level 5 (volume)
Definition
requires a minimum of 3 drives and writes to all drives in the solution like a striped volume.
- stores redundant data (parity data) on one of the disks.
- Redundant data is used to calculate the missing data when a disk goes missing, ensuring that users can still retrieve data without noticing a problem
Term
Getting an A+ (9:1)
Definition
- Authentication is the process of proving an identity to the network, but Authorization is the process of determining whether accessing a resource is allowed after authentication takes place.

- Hackers take many different approaches to compromise a system. Protect your environment from both network-based and software-based attacks, and make sure that physical security is in place.

- a denial of service (DoS) is an attack on a system or network that prevents the system or network from performing it's regular function.

- Social engineering is a popular type of attack involving the hacker compromising security by tricking an employee through social contact.

- You secure network traffic by encyrpting traffic between two systems by using technologies such as SSL and IPSec. Admins typically use SSL to encrypt web traffic and IPSec to encrypt internal or VPN traffic.

- securing your data involves not only protecting resources with permissions but also protecting your data by following proper data destruction procedures and backup strategies as well as creating redundant disk solutions.
Term
Windows Built-in accounts
Definition
- Administrator
- Guest

Guest is disabled by default
Term
Windows Default Groups:
Administrators
Definition
Members have full access to the system and can change any setting on the system.
Term
Windows Default Groups:
Backup Operators
Definition
Members can perform backups and restores on the system
Term
Windows Default Groups:
Account Operators
Definition
Members can create user accounts not the entire system
Term
Windows Default Groups:
Printer Operators
Definition
Members can change any settings on the printers.
Term
Windows Default Groups:
Users
Definition
All members can be assigned specific permissions
Term
Windows Default Groups:
Power Users
Definition
Prior to Windows Vista, members allowed to create user accounts and manage printing environment.

Use this if the desktop OS does not have an account operator or a printer operator group
Term
Copying and moving files:
Move on same partition
Definition
It keeps the files permissions
Term
Copying and moving files:
Copy on same partition
Definition
The new file inherits the permissions of the folder it was copied to
Term
Copying and moving files:
Move across partition
Definition
file inherits the permissions of the target folder, not the original permissions
Term
Copying and moving files:
Copy across partition
Definition
new file inherits the permissions of the destination folder
Term
Exposing servers to the internet
Definition
Be sure to put these servers in a DMZ (demilitarized zone) so you can selectively choose which type of data is allowed to reach your servers.
Term
Getting an A+ (9:2)
Definition
- Create user accounts for each user of the system. Make sure that users use strong passwords for those accounts and understand to not share those passwords

- Assign permissions to resources such as folders and files to ensure that unauthorized users don't get access to the resource

- Enable auditing so that you are aware of any security-related events that happen on the system. Also be sure to review the security log often

- Enable a firewall for the network and enable the Firewall on the Windows System

- Secure your wireless router by disabling the wireless feature if you are not using the wireless components of the router. If you are using wireless, be sure to implement WEP or WPA and disable SSID broadcasting
Term
You have enabled auditing; where do you go to view the audit information?
1. Local Security Policy
2. Event Viewer
3. LAN Connection Properties
4. Firewall
Definition
2. Event viewer
Term
A privilege to perform an operating system task is known as what?
1. Permission
2. Policy
3. Right
4. Firewall
Definition
3. A right gives you the privilege to perform an operating system task
Term
Getting an A+ (9:3)
Definition
- A virus is a program that does harm to your system

- Popular types of viruses are file, boot sector, and macro viruses

- Other types of malicious software are Trojan horse, worms, and spyware

- You may use antivirus software to remove viruses from your system and antispyware software to remove spyware from your system

- Be sure to update your virus definitions on a regular basis so that your virus protection software can protect your system against the most popular viruses
Term
What software allows the network administrator to deploy patches to all the systems on the network after they are downloaded to a central server?
1. Virus protection software
2. Virus definitions
3. WSUS
4. Trojans
Definition
3. WSUS can deploy updates to all systems on the network
Supporting users have an ad free experience!