Shared Flashcard Set

Details

Sekurity
This is about sekurity
19
Computer Networking
12th Grade
12/05/2012

Additional Computer Networking Flashcards

 


 

Cards

Term

 

 

 

EFS

Definition

The Encrypted File System (EFS) allows files and folders to be encrypted within Windows. To run EFS, the hard drive must be formatted with NTFS, and the OS must be a Professional, Business, Ultimate or Enterprise version of XP, Vista or Windows 7. When using EFS, a folder that is encrypted automatically encrypts any file inside it or copied to it, although encryption can be specified to be only for that folder or all of its subfolders. Encrypted files stay encrypted if moved to another folder on the same or

another NTFS drive, even if the destination isn’t encrypted.

Term

 

 

 

Bitlocker

Definition
Available starting with Vista, this program allows a user to encrypt an entire volume, and any other volume, on the drive. Intended to work in conjunction with file and folder encryption, BitLocker – which is based on the Advanced Encryption Standard (AES) and uses a 128-bit encryption key – is one of several drive encryption schemes available, though it’s the only one native to Windows.
Term

 

 

 

VPN

Definition
These send data securely over public networks by establishing a secure channel of communication between a user and a server called a tunnel, which allows the data packets to be encrypted. They use a number of encryption protocols to encode data after authentication has been achieved, including Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (L2TP), Secure Sockets Layer (SSL) or IP Security (IPSec).
Term

 

 

 

Software firewall

Definition
These programs check data packets sent over a network to make a determination, based on various data in the packet and rules programmed into the firewall, on whether to block the packets or send them on to the intended destination. Most firewalls were hardware for years, but software firewalls have gained in popularity with the rise of the Internet and personal computing. Firewalls can protect against inbound threats only – known as a one-way firewall – or against both unauthorized inbound and outbound traffic, known as a two-way firewall.
Term

 

 

 

Authentication Systems

Definition
These are methods by which access can be granted to users. These include passwords, usernames, biometrics, and smart cards.
Term

 

 

 

Social Engineering

Definition
These are methods of hacking that involve deceit. It includes phishing, trojan horses, pretexting, and baiting.
Term

 

 

 

WEP and WPAx

Definition
This was the first wireless encryption protocol, and was superceded by the next. The first version of the supercedent uses TKIP encryption and the second version uses AES encryption.
Term

 

 

 

Computer Virus

Definition
These are programs than infect a computer, making unwanted changes to the OS, while being able to self-replicate.
Term

 

 

 

Trojan Horse

Definition
These are programs that are hidden as file converters or utilities, and install harmful programs.
Term

 

 

 

Worms

Definition
These are self-replicating programs that use networks to transfer themselves to other computers.
Term

 

 

 

Spam

Definition
These are bulk messages usually sent though email that can contain large amounts of malicious programs.
Term

 

 

 

Spyware

Definition
This is software that monitors the usage of a computer and transmits the data back to its creator.
Term

 

 

 

Adware

Definition
These are ads (popups and such) that link to web searches and activities.
Term

 

 

 

Grayware

Definition
This is a general term for any annoying and malicious program.
Term

 

 

 

Biometrics

Definition
These devices, such as fingerprint and eye scanners, are used to identify specific people by their body. 
Term

 

 

 

BIOS Security

Definition
These are methods by which the basic files of a computer can be protected
Term

 

 

 

Drive Lock

Definition
These are password prompts that occur during bootup to secure the computer before the OS is loaded. These can be activated and edited in BIOS.
Term

 

 

 

Intrusion Detector

Definition
This is a measure preformed by the BIOS (this can be set by the user) that detects if the computer case is open, and if so, interrupts the boot.
Term

 

 

 

TPM

Definition
This is a motherboard chip used to store encrypted keys for various encryption methods, including BitLocker. It provides security because, even if an unauthorized user simply removed the hard drive from a system, the drive would not allow access without the TPM’s encrypted keys.
Supporting users have an ad free experience!