Individuals are always free to decide what security measures they want to use.
It’s best to use three-factor authentication.
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level.
Don’t use the same password on more than one system (computer, network, or application).
When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day.
The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.
ISO 17799 and ISO 27002
For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals.
When implementing a security plan, the four steps are sometimes called the ____.
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.
A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.
A ____ is made of several words with spaces allowed.
A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.
A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data.
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
Most encryption software products use a method called ____.
Pubic Key Encryption
____ is any annoying and unwanted program that might or might not mean you harm.
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
A ____ virus can hide in either of two boot areas of a hard drive.
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current.
Generally speaking, the weakest link in setting up security in a computer environment is ____.
In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive.
Want to see the other 26 Flashcards in Chapter 19?JOIN TODAY FOR FREE!