Home > Articles

Security

  • Print
  • + Share This
This chapter is from the book

Define Key Terms

Define the following key terms from this chapter and check your answers in the glossary:

  • mantrap

  • RFID technology

  • smart card

  • biometric security

  • token

  • cable lock

  • USB lock

  • privacy screen

  • key fob

  • entry control roster

  • Active Directory Service

  • login script

  • domain

  • Group Policy

  • Organizational Unit (OU)

  • home folder

  • folder redirection

  • software token

  • mobile device management (MDM)

  • MAC address

  • whitelisting

  • MAC address filtering

  • MAC address cloning

  • certificate

  • antivirus/anti-malware software

  • firewall

  • two-way firewall

  • authentication

  • multifactor authentication

  • directory permissions

  • file and folder permissions

  • virtual private network (VPN)

  • data loss/leakage prevention (DLP)

  • access control list

  • email filtering

  • principle of least privilege

  • Wired Equivalent Privacy (WEP)

  • WiFi Protected Access (WPA)

  • Temporal Key Integrity Protocol (TKIP)

  • Advanced Encryption Standard (AES)

  • single-factor authentication

  • multifactor authentication

  • Remote Authentication Dial-In User Service (RADIUS)

  • Terminal Access Controller Access Control System (TACACS)

  • ransomware

  • Trojan

  • keylogger

  • rootkit

  • virus

  • botnet

  • worm

  • spyware

  • Recovery Console

  • acceptable use policy (AUP)

  • Domain Name Service (DNS)

  • social engineering

  • phishing

  • spear phishing

  • impersonation

  • shoulder surfing

  • tailgating

  • piggybacking

  • dumpster diving

  • distributed denial of service (DDoS)

  • denial of service (DoS)

  • zero day

  • man-in-the-middle (MiTM)

  • brute force attack

  • dictionary attack

  • rainbow table

  • spoofing

  • non-compliant systems

  • zombie

  • access control

  • NT File System (NTFS)

  • file attributes

  • local shares

  • administrative shares

  • system files and folders

  • SSO

  • Single Sign-on

  • BitLocker

  • Trusted Platform Module (TPM)

  • BitLocker To Go

  • Encrypting File System (EFS)

  • autorun

  • screen lock

  • fingerprint lock

  • face lock

  • swipe lock

  • passcode locking

  • remote wipe

  • locator application

  • remote backup application

  • patching/OS updates

  • biometric authentication

  • full device encryption

  • authenticator application

  • bring your own device (BYOD)

  • overwrite

  • drive wipe

  • service set identifier (SSID)

  • default SSID

  • Network Address Translation (NAT)

  • port forwarding

  • port mapping

  • + Share This
  • 🔖 Save To Your Account