36 terms

Computer Engineering II 207

STUDY
PLAY

Terms in this set (...)

Authorization
The process of giving someone permission to do or have something; in multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth)
Security Token
An electronic software access and identity verification device used in lieu of, or with an authentication password
User Account Control
Notifies you before changes are made to your computer that require administrator-level permission
Kensington Lock
An anti-theft system that is a small, metal-reinforced hole found commonly on small or portable computers and electronics equipment such as laptops, computer monitors, desktop computers, gaming consoles, and video projectors, used for attaching a lock-and-cable apparatus
Screen Lock
Pushing the Windows key and the L key locks the system until the user enters their password
Certificate of Destruction
Proof that hard drives have been destroyed
Darik's Boot And Nuke
A program designed to securely erase a hard disk until data are permanently removed and no longer recoverable, which is achieved by overwriting the data with pseudorandom numbers generated by Mersenne twister or ISAAC
Data Erasure
A software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media
Degaussing Tool
Used to neutralize or rebalance the magnetic field of a magnetized object, such as a computer disk drive, which erases information from the storage device
Electro Magnet
A device consisting of a coil of insulated wire wrapped around an iron core that becomes magnetized when an electric current flows through the wire
Incineration
The destruction of something, especially waste material, by burning
Low Level Format
The process of outlining the positions of the tracks and sectors on the hard disk, and writing the control structures that define where the tracks and sectors are
Metal Shredder
A machine for destroying metal objects
Overwrite
To write over other content
Advanced Encryption Standard
Wireless encryption algorithm used with WPA2
Temporal Key Integrity Protocol
Password encryption process first used to cover gaps in WEP then rolled over to enhance WPA wireless security
WiFi Protected Access
A security standard for users of computers equipped with Wi-Fi wireless connection designed to replace the original Wi-Fi security standard, Wired Equivalent Privacy
WiFi Protected Setup
An automated wireless encryption setup feature that has been deprecated due to security flaws
Wired Equivalent Privacy
A security protocol designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN
Wireless Encryption
The process of transforming radio wave information using an algorithm to make it unreadable to anyone except those possessing the key
Hardware Firewall
An internet appliance, residing between the switch(es) and router, designed specifically to act as an intermediary between all outgoing and incoming messages across a network
MAC Filtering
A security feature of a WAP or router that is based on host MAC addresses, the WAP or router scans a user defined list of MAC addresses, and if the host devices MAC address is in the list then the device is permitted access
Network Address Translation
The modifying of an IP address as it passes through a network device, usually a router, so that it can be mapped to a different address, this is usually done on private networks so that many private IP addresses can share a single public IP address, NAT is usually enabled by default on routers using IPv4 because of the limited availability of public IPv4 addresses
SOHO LAN
Usually involves a switch, router, and maybe a hardware firewall
Static IP Addressing
Manually assigning an IP address to a system or device on a LAN, thus giving an admin tight control over what can and cannot connect to the network
BIOS
The program a personal computer's microprocessor uses to get the computer system started after you turn it on
Browser Hijacking
When a browser is redirected to a site the user did not request
Keylogger
A type of spyware that records keystrokes for the purposes of stealing personal information
Master Boot Record
(MBR) The information in the first sector of any hard disk that identifies how and where an operating system is located so that it can be boot into the computer's main storage or random access memory
Quarantine
A place of isolation for an infected computer so that malware is not spread to other susceptible computers
Registry
The configuration database in all 32-bit versions of Windows that contains settings for the hardware and software in the PC it is installed in, it is made up of the SYSTEM.DAT and USER.DAT files
Restore Point
Refers to the fixed state of a computer system and data at a specific date and time
Rootkit
A virus that is loaded before the operating system load is complete, often making it invisible to antivirus software
Signature
A unique algorithm or hash code that identifies a piece of software as a specific virus or other malware
System Protection
A Windows feature that regularly creates and saves information about your computer's system files and setting
Windows Defender
Antispyware included in the operating system Windows Vista and later