Unit 18 ( Key Fob- Spoofing)

Ace your homework & exams now with Quizwiz!

Malware definition

Informations about malware that allows anti-malware software to detect and define malware. Also called malware signature.

Phishing

Sending an email message with the intent of getting the user to reveal private information that can be used for identifying theft.

Intrusion Detection Systems (IDS)

Software that can run on a UTM (unified threat management) appliance, router, server, or workstation to monitor all network traffic, create alerts, and prevent the threatening traffic from burrowing into the system.

RFID badge

a badge worn by an employee and used to gain entrance into a locked area of a building. A radio frequency identification token transmits authentication to the system when the token gets in range of a query device.

Remote backup application

a cloud backup service on the internet that backs up data to the cloud and is often used for laptops, tablets, and smartphones.

Quarantine computer

a computer that is suspected of infection and is not allowed to use the network, is put on a different network dedicated to quarantined computers, or is allowed to access only certain network resources.

Smart card reader

a device that can read a smart card used to authenticate a person onto a network.

Next-Generation Firewall (NGFW)

a firewall that combines firewall software with anti malware software and other software that protects resources on a network.

Spear phishing

a form of phishing where an email message appears to come from a company you already do business with.

Site license

a license that allows a company to install multiple copies of software or to allow multiple employees to execute the software from a file server.

Malware encyclopedia

a list of malware, including symptoms and solutions, often maintained by manufacturers of anti malware and made available on their websites.

Spoofing

a phishing technique where you are tricked into clicking a link in an email message, which takes you to an official looking website where you are asked to enter your user id and password to enter the site.

Mantrap

a physical security technique of using two doors on either end of a small entryway where the first door much close before the second door can open. A separate form of identification might be required for each door, such as a badge for the first door and a fingerprint scan for the second door. In addition, a security guard might monitor people as they come and go.

Security token

a smart card or other device that is one factor in MFA or can serve as a replacement for a password.

Lojack

a technology by Absolute Software used to track the whereabouts of a laptop computer and, if the computer is stolen, lock down access to the computer or erase data on it. The technology is embedded in the UEFI/BIOS of many laptops.

Rootkit

a type of malicious software that loads itself before the OS boot is complete and can hijack internal windows components so that it masks information windows provides to user mode utilities such as file explorer or task manager.

Local security policy

a windows administrative tools snap in control panel that can manage the group of policies in the local computer policy, computer configuration, windows settings, security settings group of group policy.

Local users and groups

for business and professional editions of windows, a windows utility console (lusrmgr.msc) that can be used to manage user accounts and user groups.

Ransomware

malware that holds your computer system hostage with encryption techniques until you pay money or a time period expires when the encrypted content is destroyed.

Remote wipe

remotely erases all contacts, email, photos, and other data from a device to protect your privacy.

Malware

same as malware definition.

Malware signature

same as malware definition.

Network places wizard

same as user accounts

Software piracy

the act of making unauthorized copies of original software, which violates the Federal Copyright Act of 1976.

Root certificate

the original digital certificate issued by a certification authority.

Social engineering

the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.

Mutual authentication

to authenticate in both directions at the same time, as both entities confirm the identity of the other.

Multi Factor Authentication (MFA)

to use more than one method to authenticate access to a computer, network, or other resource.

Privacy Filter

A device that fits over a monitor screen to prevent other people from viewing the monitor from a wide angle.

Key Fob

A device, a type of smart card, that can fit conveniently on a keychain.

Personal license

A license to use software that gives the right to install 1 instance of the software.

Intrusion Prevention System (IPS)

A system that monitors a network for malicious activities such as security threats or policy violations. The main function of an IPS is to identify suspicious activity, and then log information, attempt to block the activity, and then finally to report it.

Non compliant system

A system that violates security best practices, such as out of date anti malware software or no anti malware software installed.

Keylogger

A type of spyware that tracks your keystrokes, including passwords, chat room sessions, email messages, documents, online purchases, and anything else you type on your computer. Text is logged to a text file and transmitted over the internet without your knowledge.

Shoulder surfing

As you work, other people secretly peek at your monitor screen to gain valuable information.

Man in the middle attack

an attack that pretends to be a legitimate website, network, FTP site, or person in a chat session in order to obtain private information.

Smart card

any small device that contains authentication information that can be keyed into a sign in window or read by a reader to authenticate a user on a network.

Malicious software

any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data dnd software. Types of infestations include viruses, trojan horses, worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders, also called malware or computer infestation.


Related study sets

Series 6: Retirement Accounts (Individual Retirement Accounts)

View Set

CLEP Exam - Principles of Management

View Set

AP EUROPEAN HISTORY MIDTERM (with French Revolution and No Pictures Sets)

View Set

Chap 12: Nursing and the Law: What Are the Rules?

View Set

ten most important cities in france

View Set

Psychology of Personality Exam 3-5: Personal Construct Theory (Kelly)

View Set

Database Management: Exam 2 (Ch. 4 & 5)

View Set