A+ Guide to IT Technical Support Chapter 18

acceptable use policy (AUP)

A document that explains to users what they can and cannot do on the corporate network or with company data, and the penalties for violations.

access control list (ACL)

A record or list of the resources (for example, a printer, folder, or file) that a user, device, or program has access to on a corporate network, server, or workstation.

anti-malware software

Utility software that can prevent infection, scan a system, and detect and remove all types of general malware, including viruses, spyware, worms, and rootkits.

antivirus software

Utility software that can prevent infection, scan a system, and detect and remove viruses.

ATA Secure Erase

Standards developed by the that dictate how to securely erase data from solid-state devices such as a USB flash drive or SSD drive.

biometric authentication

To authenticate to a network, computer, or other computing device by means of biometric data.

biometric device

An input device that inputs
biological data about a person.

BitLocker Drive Encryption

A utility in Windows
that is used to lock down a hard drive by encrypting the entire Windows volume and any other volume on the drive

BitLocker To Go

A Windows utility that can encrypt data on a USB flash drive and restrict access by requiring a password.

brute force attack

A method to hack or discover a password by trying every single combination of characters.

BYOD

A corporate policy that allows employees or students to connect their own devices to the corporate network.

cellular network analyzer

Software and hardware that can monitor cellular networks for signal strength of cell towers

certificate of destruction

Digital or paper documentation, which ensures that data has been destroyed beyond recovery.

Certification Authority (CA)

An organization, such as VeriSign, that assigns digital certificates or digital signatures to individuals or organizations.

chain of custody

Documentation that tracks evidence used in an investigation and includes
exactly what, when, and from whom the evidence was collected, the condition of the evidence, and how the evidence was secured while in possession of a responsible party.

commercial license

As applied to software, the rights to use the software, which have been assigned to the user by the software vendor.

computer infestation

a system that has been over run with malicious software.

copyright

The right to copy the work that belongs to the creators of the works or others to whom the creator transfers this right.

data loss prevention (DLP)

Methods that protect corporate data from being exposed or stolen.

degausser

A machine that exposes a magnetic storage device such as a hard drive or tape drive to a strong magnetic field to completely erase the data on the storage device.

dictionary attack

A method to discover or crack a password by trying words in a dictionary.

digital certificate

A code used to authenticate the source of a file or document or to identify and authenticate a person or organization sending data over a network

digital rights management (DRM)

Software and hardware security limitations meant to protect digital content and prevent piracy.

email filtering

To search incoming or outgoing email messages for matches kept in databases, searching for known scams and spammers to protect against social engineering.

email hoax

An email message that is trying to tempt you to give out personal information or trying to scam you.

Encrypted File System (EFS)

A way to use a key to encode a file or folder on an NTFS volume to protect sensitive data. Because it is an integrated system service, ______ is transparent to users and applications.

End User License Agreement (EULA)

A digital or printed statement of your rights to use or copy software, which you agree to when the software is installed.

enterprise license

A license to use software that allows an organization to install multiple instances of the software. Also called site license.

entry control roster

A list of people allowed into a restricted area and a log of any approved visitors that is used and maintained by security guards.

gpresult

The Windows command to find out group policies that are currently applied to a system for the computer or user.

grayware

A program that is potentially harmful or potentially unwanted.

intrusion detection system (IDS)

Software that can run on a UTM appliance, router, server, or workstation to monitor all network traffic and create alerts when suspicious activity happens.

intrusion prevention system (IPS)

Software that can run on a UTM (Unified Threat Management) appliance, router, server, or workstation to monitor all network traffic, create alerts, and prevent the threatening traffic from burrowing into the system.

key fob

A device, such as a type of smart card, that can fit conveniently on a key chain.

keylogger

A type of spyware that tracks your keystrokes

Local Security Policy

A Windows Administrative Tools snap-in in Control Panel that can manage the group of policies in the Local Computer Policy, Computer Configuration, Windows Settings, Security Settings group of Group Policy.

Local Users and Groups

a Windows utility console (lusrmgr.msc) that can be used to manage user accounts and user groups.

LoJack

A technology by Absolute Software used to track the whereabouts of a laptop computer and, if the computer is stolen, lock down access to the computer or erase data on it.

malicious software

Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software.

malware definition

Information about malware that allows anti-malware software to detect and define malware.

malware encyclopedia

Lists of malware, including symptoms and solutions, often maintained by manufacturers of anti-malware and made available on their websites.

man-in-the-middle attack

An attack that pretends to be a legitimate website, network, FTP site, or person in a chat session in order to obtain private information.

mantrap

A physical security technique of using two doors on either end of a small entryway where the first door must close before the second door can open.

multifactor authentication (MFA)

To use more than one method to authenticate access to a computer, network, or other resource.

mutual authentication

To authenticate in both directions at the same time, as both entities confirm the identity of the othe

next-generation firewall (NGFW)

A firewall that combines firewall software with anti-malware software and other software that protects resources on a network.

non compliant system

A system that violates security best practices, such as out-of-date antimalware software or no anti-malware software installed.

personal license

A license to use software that gives the right to install one instance of the software.

phishing

Sending an email message with the intent of getting the user to reveal private information that can be used for identity theft. Also see spear phishing and spoofing.

privacy filter

A device that fits over a monitor screen to prevent other people from viewing the monitor from a wide angle.

quarantined computer

A computer that is suspected of infection and is not allowed to use the network.

ransomware

Malware that holds your computer system hostage with encryption techniques until you pay money or a time period expires when the encrypted content is destroyed.

remote backup application

A cloud backup service on the Internet that backs up data to the cloud and is often used for laptops, tablets, and smart phones.

remote wipe

Remotely erases all contacts, email, photos, and other data from a device to protect your privacy.

RFID badge

A badge worn by an employee and used to gain entrance into a locked area of a building. A Radio Frequency Identification token transmits authentication to the system when the token gets in range of a query device.

root certificate

The original digital certificate issued by a Certification Authority.

rootkit

A type of malicious software that loads itself before the OS boot is complete and can hijack internal Windows components so that it masks information Windows provides to user-mode utilities such as File Explorer or Task Manager.

security token

A smart card or other device that is one factor in multifactor authentication or can serve as a replacement for a password.

shoulder surfing

As you work, other people secretly peek at your monitor screen to gain valuable information.

site license

license that allows a company to install multiple copies of software, or to allow multiple employees to execute the software from a file server. Also called enterprise license.

smart card

Any small device that contains authentication information that can be keyed into a sign-in window or read by a reader to authenticate a user on a network.

smart card reader

A device that can read a smart card used to authenticate a person onto a network.

social engineering

The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer

software piracy

The act of making unauthorized copies of original software, which violates the Federal Copyright Act of 1976.

spear phishing

A form of phishing where an email message appears to come from a company you already do business with.

spoofing

A phishing technique where you are tricked into clicking a link in an email message, which takes you to an official-looking website where you are asked to enter your user ID and password to enter the site.

spyware

Malicious software that installs itself on your computer or mobile device to spy on you. It collects personal information about you that it transmits over the Internet to web-hosting sites that intend to use your personal data for harm.

strong password

A password that is not easy to guess. Contain Upper and Lower case letter, numbers and symbols.

tailgating

When someone who is unauthorized follows an employee through a secured entrance to a room or building.

TPM (Trusted Platform Module)

A chip on a motherboard that holds an encryption key required at startup to access encrypted data on the hard drive.

Trojan

A type of malware that tricks you into downloading and/or opening it by substituting itself for a legitimate program.

Unified Threat Management (UTM)

A computer, security appliance, network appliance, or Internet appliance that stands between the Internet and a private network and runs firewall, anti-malware, and other software to protect the network.

virus

A program that often has an incubation period, is infectious, and is intended to cause damage.

Wi-Fi analyzer

Hardware and/or software that monitors a Wi-Fi network to detect devices not authorized to use the network, identify attempts to hack transmissions, or detect performance and security vulnerabilities.

Windows Firewall

A personal firewall that protects a computer from intrusion and is automatically configured when you set your network location in the Network and Sharing Center.

worm

An infestation designed to copy itself repeatedly to memory, on drive space, or on a network, until little memory, disk space, or network bandwidth remains.

zero-day attack

When a hacker discovers and exploits a security hole in software before the developer of the software can develop and provide a protective patch to close the hole.

zombie

A computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the knowledge of its user.