Device security

What are the 3A's?
Authentication, authorisation and auditing
1 of 33
What is authentication?
Identifying an individual
2 of 33
What is authorisation?
Giving individuals access to resources based on their identities
3 of 33
What is auditing?
Keeping track of a users activity while access resources
4 of 33
Authentication- what you know?
Username and password
5 of 33
Authentication- what you own?
Digital certificates, smart cards, tokens and mobile phone
6 of 33
Authentication- what you are?
Biometrics
7 of 33
What is windows rights management services?
Provides an extra level of security to documents
8 of 33
What does Windows RMS use to limit who can access a document or web page?
Encryption
9 of 33
What are permissions?
Specify what a user or group can do with an object
10 of 33
Name 4 types of permissions
Share permissions, NTFS permissions, registry permissions and active directory permissions
11 of 33
What are NTFS permissions?
Allow you to restrict the actions other users can take on a file that is stored on an NTFS volume
12 of 33
What are the 5 basic NTFS permissions?
Full control, modify, read&execute, read and write
13 of 33
What must users be given to acces shares on a file server?
Share permissions
14 of 33
Name 4 ways to protect mobile device vulnerabilities
Change default username&password, change SSID or disable broadcast, encryption and firewall
15 of 33
What does malicious software do?
Infiltrate or affect a computer system without the owners informed consent
16 of 33
What is malware usually associated with?
Viruses, worms, trojan horses, spyware, rootkits and adware
17 of 33
What is a virus?
A program that can copy itself and infect a computer without the users knowledge or consent
18 of 33
Where are viruses normally imbedded?
Into macro code of documents
19 of 33
What is another common form of computer viruses?
The internet
20 of 33
What is a worm?
Self-replicating program that copies itself across a computer or network without any user intervention
21 of 33
What do worms look to do?
Consume resources
22 of 33
How are worms usually spread?
Exploiting security holes in OS or TCP/IP
23 of 33
What are trojans?
Malware that hides itself as a program that appears desirable or useful
24 of 33
What is spyware?
Looks to collect information about a user, without their knowledge or consent
25 of 33
What is an example of spyware?
Keylogger
26 of 33
What is adware?
Software package that automatically plays, displays or downloads advertisements to a computer
27 of 33
What is adware usually a source of?
User frustration
28 of 33
Name 3 symptoms of malware
Poor system performance, Low levels of available memory, poor performance on internet, decreased response rates, longer start up times, pop-ups, toolbars added to browser, browser closing unexpectedly etc.
29 of 33
What does antivirus look for?
Known malware signatures and patterns
30 of 33
How often are new viruses created?
Daily
31 of 33
Name 6 CMD components
Ping, ipconfig, netstat, tracert, sfc and chkdsk
32 of 33
Name 3 powershell components
Test-netconnection, Get-netconfiguration and resolve-dnsname
33 of 33

Other cards in this set

Card 2

Front

What is authentication?

Back

Identifying an individual

Card 3

Front

What is authorisation?

Back

Preview of the front of card 3

Card 4

Front

What is auditing?

Back

Preview of the front of card 4

Card 5

Front

Authentication- what you know?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar All resources:

See all All resources »See all IT resources »