A machine that exposes a storage device to a strong magnetic field to completely erase the data on a magnetic hard drive or tape drive.
  • virus
  • grayware
  • privacy filter
  • degausser
A device that can read a smart card used to authenticate a person onto a network.
  • grayware
  • shoulder surfing
  • privacy filter
  • smart card reader
A way to use a key to encode a file or folder on an NTFS volume to protect sensitive data. Because it is an integrated system service, EFS is transparent to users and applications.
  • BitLocker Encryption
  • virus definition
  • Encrypted File System (EFS)
  • antivirus (AV) software
Any small device that contains authentication information that can be keyed into a logon window or read by a reader to authenticate a user on a network.
  • biometric device
  • Security Center
  • email hoax
  • smart card
A code used to authenticate the source of a file or document or to identify and authenticate a person or organization sending data over a network. The code is assigned by a certificate authority such as VeriSign and includes a public key for encryption. Also called digital ID or digital signature.
  • worm
  • quarantined computer
  • tailgating
  • digital certificate
When someone who is unauthorized follows the employee through a secured entrance to a room or building.
  • degausser
  • email hoax
  • digital certificate
  • tailgating
A utility in Windows 7/Vista Ultimate and Enterprise editions that is used to lock down a hard drive by encrypting the entire Windows volume and any other volume on the drive.
  • antivirus (AV) software
  • Security Center
  • boot sector virus
  • BitLocker Encryption
A type of smart card that contains authentication information.
  • keylogger
  • RSA tokens
  • rootkit
  • Trojan
A program that often has an incubation period, is infectious, and is intended to cause damage. A virus program might destroy data and programs or damage a disk drive's boot sector.
  • degausser
  • grayware
  • virus definition
  • virus
(1) A type of identity theft where a person is baited into giving personal data to a web site that appears to be the web site of a reputable company with which the person has an account. (2) Sending an email message with the intent of getting the user to reveal private information that can be used for identify theft.
  • phishing
  • Trojan
  • keylogger
  • rootkit
A program that AV software recognizes to be potentially harmful or potentially unwanted.
  • adware
  • degausser
  • key fob
  • grayware
An email message that is trying to tempt you to give out personal information or trying to scam you.
  • RSA tokens
  • grayware
  • smart card
  • email hoax
A computer that is suspected of infection and is not allowed to use the network, is put on a different network dedicated to quarantined computers, or is allowed to access only certain network resources.
  • retinal scanning
  • quarantined computer
  • BitLocker Encryption
  • biometric device
Where other people secretly peek at your monitor screen as you work to gain valuable information.
  • smart card reader
  • privacy filter
  • shoulder surfing
  • social engineering
A type of malicious software that loads itself before the OS boot is complete and can hijack internal Windows components so that it masks information Windows provides to user-mode utilities such as Windows Explorer or Task Manager.
  • keylogger
  • rootkit
  • Trojan
  • phishing
A type of spyware that tracks your keystrokes, including passwords, chat room sessions, email messages, documents, online purchases, and anything else you type on your PC. Text is logged to a text file and transmitted over the Internet without your knowledge.
  • RSA tokens
  • degausser
  • keylogger
  • rootkit
Software used to remove spyware and adware.
  • adware
  • strong password
  • virus encyclopedia
  • antispyware software
As part of the authentication process, some systems use biometric data by scanning the blood vessels on the back of the eye and is considered the most reliable of all biometric data scanning.
  • Security Center
  • retinal scanning
  • biometric device
  • Window Firewall
An input device that inputs biological data about a person; the data can identify a person's fingerprints, handprints, face, voice, eyes, and handwriting.
  • biometric device
  • smart card
  • boot sector virus
  • Security Center
A type of malware that tricks you into opening it by substituting itself for a legitimate program.
  • LoJack
  • RSA tokens
  • rootkit
  • Trojan
A password that is not easy to guess.
  • virus encyclopedia
  • Windows Defender
  • strong password
  • smart card reader
A badge worn by an employee and is used to gain entrance into a locked area of a building. A Radio Frequency Identification token transmits authentication to the system when the token gets in range of a query device.
  • degausser
  • LoJack
  • RFID badge
  • smart card
Any unwanted program thatis transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. Types of infestations include viruses, Trojan horses, worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders. Also called malware, infestation, or computer infestation.
  • boot sector virus
  • BitLocker Encryption
  • retinal scanning
  • malicious software
A technology by Absolute Software used to track the whereabouts of a laptop computer and, if the computer is stolen, lock down access to the computer or erase data on it. The technology is embedded in the BIOS of many laptops.
  • LoJack
  • Trojan
  • rootkit
  • RFID badge
Malicious software that installs itself on your computer to spy on you. It collects personal information about you that it transmits over the Internet to web-hosting sites that intend to use your personal data for harm.
  • grayware
  • adware
  • spyware
  • malware
Standards developed by the American National Standard Institute (ANSI) that dictate how to securely erase data from solid-state devices such as a USB flash drive or SSD drive in order to protect personal privacy.
  • digital certificate
  • Encrypted File System (EFS)
  • tailgating
  • ATA Secure Erase
A device, such as a type of smart card, that can fit conveniently on a key chain.
  • key fob
  • grayware
  • smart card reader
  • privacy filter
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0