SYS 140: Week 11 reading - WanderlustPenguin/Charles-Tech-Journal GitHub Wiki

Security policy- one or more policies that provide rules on computer and network safety

Noncompliant systems are systems that violate the security policies. These are dangerous for network security.

Physical security- security related to physical access to a location, including things like security cards, physical barriers, and security guards

Tailgating is a person without access to a location following someone who does, using their access to bypass security due to physical proximity.

Digital security- security relating to the devices and networks. This can take a large variety of forms, such as firewalls, VPNs, and antivirus.

Passwords are another example of digital security

Malware can take a variety of forms; including spyware, viruses, worms, trojans, rootkits, and ransomware

Social engineering targets employees in order to obtain information from them/use them to access the network

Phishing is a kind of social engineering attack, where an attacker attempts to trick someone into sharing personal information by pretending to be a trusted authority who would reasonably request said information.

Security attacks are how attackers try and break into a network

Share permissions give or deny people access to certain files and folders on a network, based on what the administrator allows them access to.

NTFS permissions also give people access to information, but can limit what they are able to do with their access, i.e. read permission and not write permission or read and execute permission. This type of permission can only be used on NTFS drives.

It’s important to keep security up to date, control who has access to what, and ensure you have backups of information and ways to interact with devices.

Full backups back up everything each time you backup your system

Incremental and differential backups only backup files that have changed since the last backup