Upgrade to remove ads
IT Fundamentals - Security
CC-BY-SA source: https://en.wikiversity.org/wiki/IT_Fundamentals/Security
Terms in this set (30)
The process of confirming identity.
The function of specifying access rights to resources.
A full disk encryption feature included with the Ultimate and Enterprise editions of Windows Vista and later Windows operating systems.
A cryptanalytic attack that consists of systematically checking all possible keys or passwords until the correct one is found.
The process of securing a system by reducing its surface of vulnerability through the removal of unnecessary software, unnecessary usernames or logins and the disabling or removal of unnecessary services.
A technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities from a list.
The practice of sifting through commercial or residential waste to find items that have been discarded by their owners, but that may prove useful to the collector.
A computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.
The act of assuming the identity of another, in order to commit fraud, such as accessing confidential information, or to gain property not belonging to them.
Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
A method of computer access control which a user can pass by successfully presenting authentication factors from at least two of the three categories of knowledge, possession, and inherence.
A computer program that can intercept and log traffic passing over a digital network.
The length and character set combinations used to create a password, such as upper case and lower case letters, numbers, and punctuation.
A set of rules or a promise that limits access or places restrictions on password sharing.
The process of recovering passwords from data that have been stored in or transmitted by a computer system, most often through brute-force or dictionary attacks.
A policy that requires users to change passwords periodically.
A policy that prevents users from repeating recently used passwords.
Access rights assigned to specific users and groups of users to control the ability of the users to view or make changes to system objects.
The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
Measures designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm.
A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed.
Using direct observation techniques to obtain information such as passwords, PINs, security codes, and similar data.
A property of access control systems that allows a user to log in once and gain access to all interrelated systems without being prompted to log in again.
Psychological manipulation of people to cause them to perform actions or divulge confidential information.
Unsolicited electronic messages, especially advertising.
Unsolicited electronic messages targeting users of instant messaging services.
Concealing the identity of the sender by impersonating another computing system.
Software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
A non-self-replicating type of malware program containing malicious code that, when executed typically causes loss or theft of data, and possible system harm.
A malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or firmware.
THIS SET IS OFTEN IN FOLDERS WITH...
IT Fundamentals - Hardware
IT Fundamentals - Safety
IT Fundamentals - Operating Systems
IT Fundamentals - Internetworking
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari…
Cyber Security Terms (CyberOPs)
BTE EXAM 2
OTHER SETS BY THIS CREATOR
IT Fundamentals - Business Continuity
IT Fundamentals - Troubleshooting
IT Fundamentals - Security Practices
IT Fundamentals - Security Concepts