Ch 18 Key Terms

The flashcards below were created by user Da1JL1 on FreezingBlue Flashcards.

  1. adware
    sftware installed on comptr produces pop-up ads using your browser; ads based on browsing habits
  2. antispyware software
    used to remove adware and spyware
  3. AV
    • antivirus software
    • utility programs that prevent infect'n/scan systm to detect & remove viruses
    • (Ex: McAffee Associates' VirusScan & Norton Antivirus)
  4. ATA Secure Erase
    Standards developed by American Nat'l Standard Institute (ANSI) that dictate how to securely erase data from solid state devices (USB flash drive/ SSD drive on order to protect personal privacy)
  5. biometric device
    input device that inputs bilogical data about a person, can identify a person's: fingerprints, handprints, face, voice, eyes, & handwriting
  6. BitLocker Encrypt'n
    utility in Win7/Vista Ultimate & Enterprise edit'ns used to lock hard drive by encrypting entire Win vol. & any other vol. on drive
  7. boot sector virus
    infectious virus can replace boot program w/modified, infected version, often causing boot & data retrieval problems
  8. degausser
    machine that exposes a storage device to a strong magnetic field to completely erase the data on a magnetic hard drive/tape drive
  9. digital certificate
    • used to authentc8 source of file/document/I.D. & authentc8 person/org sending data over ntwrk
    • this code is assigned by certificate authority such as Verisign & includes public key for encrypt'n (aka: digital ID/ digital signature)
  10. email hoax
    email msg trying to tempt usr into giving out personal info/trying to scam usr
  11. Encrypted File System
    EFS- way to use a key to encode a file/folder on NTFS vol. to protect sensitive data. Because it's an integr8d systm service, EFS is transparent to usrs & apps
  12. grayware
    program AV sftware recognizes to be potentially harmful/potentially unwanted
  13. key fob
    device (ex: smart card) that can fit conveniently on key chain
  14. keylogger
    spyware tracks: keystrokes, including psswrds, chat room sess'ns, email msgs, documents, online purchases, & anything else you type on your PC. Text is logged to text file & transmitted over the Internet w/o your knowledge
  15. LoJack
    technology used by Absolute Software used to track the whereabouts of a laptop comptr & if comptr is stolen, lockaccss to comptr/erase data on it technology is embedded in BIOS of many laptops
  16. malicious software
    • any unwanted program transmitted to a comptr w/o usr's knowledge & designed to do varying °s of damage to data & sftware
    • Includes: viruses, Trojan horses, worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders
    • AKA: malware, infestat'n, comptr infestat'n
  17. phishing
    • 1. type of identity theft where person is baited to give personal data to website that appears to be website of reputable company w/which person has acct
    • 2. Sending email msg w/intent of getting usr to reveal private info used for identity theft
  18. privacy filter
    device that fits over a monitor to prevent other people from viewing the monitor from a wide angle
  19. Quarantined comptr
    comptr suspected of infection & not allowed to use ntwrk, put on diff ntwrk dedic8d to quarantined comptrs/ allowed to accss only certain ntwrk resources
  20. retinal scanning
    part of authentic'n prcss, some systms use biometric databy scanning the blood vessels on back of eye & is considered most reliable of all biometric data scanning
  21. RFID badge
    badge worn by employee & used to gain entrance into locked area of a building. A Radio Frequency Identificat'n tokens transmits authentic'n to the systm when the token gets in range of a query device
  22. rootkit
    malicious sftware loads itself b4 OS boot is complete & can hijack internal Win components so it masks info Win provides to user-mode utilities such as Win Explorer/Task Manager
  23. RSA tokens
    type of smart card containing authenticat'n info
  24. Security Center
    cntr in Vista where you can confirm Win Firewall, Win Update, anti-malware settings, including that of Win Defender, & other security settings
  25. shoulder surfing
    where other people secretly peek @ your monitor screen as you work to gain valuable info
  26. smart card
    any small device containing authenticat'n info that can be keyed into logon window/read by a reader to authentic8 usr on ntwrk
  27. smart card reader
    device can read smart card u to authentic8 usr onto a ntwrk
  28. social engineering
    practice of tricking people into giving out private info/allowing unsafe programs into ntwrk/comptr
  29. spyware
    malicous sftware installs itself to spy on you. collects personal info about you & transmits over the Internet to web-hosting sites that intend to use your personal data for harm
  30. strong password
    psswrd not easy to guess
  31. tailgating
    when an unauthorized person follows an employee into a secured entrance to a room/building
  32. Trojan
    type of malware tricks you into opening it by substituting itself for legitimate program
  33. virus
    program w/incubat'n period, is infectious, & intended to cause damage. might destroy data & programs/ damage a disk drive's boot sector
  34. virus definit'n
    • set of distinguishing charstcs of a virus & used by antivirus sftware to i.d. new viruses as they get into the wild
    • Aka virus signatures
  35. virus encyclopedia
    database about viruses that's kept on Internet
  36. Win Defender
    Antispyware utility included in Win7/Vista
  37. Win Firewall
    personal firewall protects comptr from intrusion & is automatically config when you set your ntwrk locat'n in Network & Sharing Cntr
  38. worm
    infestation designed to copy itself repeatedly onto memory, drive space, /ntwrk, until little memory, disk space, /ntwrk bandwidth remains
Card Set:
Ch 18 Key Terms
2013-11-10 04:42:23
Security Strategies

Vocab for Ch 18 Abbreviation Key: Encrypt'n= encryption, comptr=computer, cntr= center, pswrd= password, org= organization, ntwrk= network, w/o = with out
Show Answers: