Front | Back |
Holds a copy of the active Directory database
|
Domain Controller
|
Manages access for a workstation
|
Computer Object
|
Manages access for an employee
|
User Object
|
Can be created to logically organize network resources
|
Organizational Unit
|
Cannot be moved, renamed, or deleted
|
Generic Container
|
Defines a collection of network resources that share a common directory database
|
Domain
|
Identifies the object classes (the type of objects) that exist in the tree and the attributes (properties) of the object
|
Schema
|
Attackers convice personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access.
|
Masquerading
|
Attackers send e-mails to senior executives and high profile personnel pretending to be from a trusted organization asking to verify personal information or send money.
|
Whaling
|
Attackers use Voice over IP (VoIP) to pretend to be from a trusted organization asking victims to verify personal information or send money.
|
Vishing
|
Attackers send e-mails with specific information about the victim (such as which online banks they use) that ask them to verify personal information or send money.
|
Spear phishing
|
Attackers send unwanted and unsolicited text messages to many people with the intent to sell products or services.
|
Spim
|
Repeatedly blasts receiving equipment with high-intensity, short-duration RF bursts at a rapid pace
|
Spark jamming
|
Produces RF signals using random amplitudes and frequencies
|
Random noise jamming
|
Uses radio signal pulses of random amplitude and frequency
|
Random pulse jamming
|