Command used to test connectivity between two devices.
ping
retina scanners, palmprint scanners, or fingerprint scanners. Fingerprint scanners are most common since they are used on smartphones and tablets.
Biometrics
able to download from sources other than Google Play. Verify that site is reputable
Android package (APK) source
used to track support calls and give technicians a place to keep their call notes. These notes should include progress notes, who did what and when, and how the problem was resolved.
Ticketing systems
A utility in Windows that is used to lock down a hard drive by encrypting the entire Windows volume and any other volume on the drive. Also called BitLocker or BitLocker Encryption
BitLocker
encrypts your hard drive and holds it hostage until you pay money, usually in bitcoin.
Ransomware
errors that are caused by problems with devices, device drivers, or a corrupted Windows installation. Begin troubleshooting by searching the Microsoft website for the error message and a description of the problem.
Blue Screen Of Death (BSOD)
an environment in which users can practice with data and processes that don’t affect the real data and where mistakes have little consequence.
Sandbox Testing
Command prompt tool used to manage hard disk drives, partitions, and volumes, allowing you to create, delete, format, and resize them, as well as assign drive letters.
DiskPart
helps control which apps or services can use network connections.
Firewall
accessing the administrative privileges of the device. Voids all warranties and usually violates BYOD policies.
Root access/jailbreak
backs up only files that have changed or been created since the last backup, whether that backup is itself an incremental or a full backup.
Incremental Backup
A centralized, managed network environment where users, computers, and resources are organized and managed through Active Directory, allowing for easier administration and security control.
Domain Access
sends “Do Not Track” requests to websites you visit. Microsoft and Google say that even though you might send this request to a website, it does not guarantee that the website will honor the request.
Private-browsing mode
Rooting and Jailbreaking make it possible for apps to appear to be a legitimate app
Application spoofing
very common right now. Software must connect to the manufacturer’s licensing server to verify that the license and usage is valid. Think Microsoft365.
Digital Rights Management (DRM)
Another way to access troubleshooting and maintenance tools such as Disk Cleanup, Computer Management, Task Scheduler, etc.
Administrative Tools
an attack that happens before a security patch is released either because the developer wasn’t yet aware of the weakness, or the developer is still working on the patch.
Zero-day attack
CMOS battery need replacement. On a Windows domain, use the Windows Time Service (W32Time) or third-party software for time accuracy
Time drift
a legal term to describe data that can uniquely identify a person, including a Social Security number, email address, physical address, birthdate, birthplace, mother’s maiden name, marital status, phone numbers, race, and biometric data.
PII (Personally Identifiable Information)