3.3 Defending Systems and Devices Flashcards

1
Q

3.3.1 Operating System Security

A

A good administrator
A good administrator will configure the operating system to protect against outside threats. That means removing any unnecessary programs and services, and making sure that security patches and updates are installed in a timely manner to correct faults and mitigate risks.

A systematic approach
It’s important to have a systematic approach in place for addressing system updates. An organization should:

establish procedures for monitoring security-related information.
evaluate updates for applicability.
plan the installation of application updates and patches.
install updates using a documented plan.

A baseline
Another critical way to secure an operating system is to identify potential vulnerabilities. To do this, establish a baseline to compare how a system is performing against baseline expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3.3.3 Types of Antimalware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

Be cautious of malicious rogue antivirus products that appear while browsing the internet. Most of these display an ad or popup that looks like an actual Windows warning. They warn that malware is infecting the computer and prompt the user to clean it. But they do not come from legitimate sources, and clicking anywhere inside the window may download and install malware instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

Fileless malware uses legitimate programs to infect a computer. Going straight into memory, this type of malware doesn’t rely on files, so it leaves no footprint. A fileless attack ends when the system is rebooted. Fileless viruses use scripting languages such as Windows PowerShell and are hard to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A

Scripting languages such as Python, Bash (the command-line language for Apple’s macOS and most Linux distributions), or Visual Basic for Applications (or VBA, used in Microsoft macros) can be used to create scripts that are malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A

Unapproved or non-compliant software may be unintentionally installed on a computer. Users may also intentionally install unauthorized programs. Although unapproved software may not be malicious, it can still violate the security policy and interfere with the organization’s software or network services. Non-compliant software should be removed immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3.3.4 Patch Management

A

What are patches?
Patches are code updates that prevent a new virus, worm, or other malware from making a successful attack. Patches and upgrades are often combined into a service pack. Many malware attacks could have been avoided if users had installed the latest service pack.

Operating systems such as Windows routinely check for updates that can protect a computer from the latest security threats. These include security updates, critical updates, and service packs. Windows can be configured to automatically download and install high-priority updates or to notify the user as these become available.

What do you need to do?
As a cybersecurity professional, it’s good practice to test a patch before deploying it throughout the organization. A patch management tool can be used to manage patches locally instead of using the vendor’s online update service.

An automated patch service provides administrators with a more control rather than waiting for patches to download. Let’s look at the benefits:

Administrators can approve or decline updates.
Administrators can force the update of systems on a specific date.
Administrators can obtain reports on the update(s) needed by each system.
There is no need for each computer to connect to the vendor’s service to download patches; instead, it gets the verified update from a local server.
Users cannot disable or circumvent updates.

A proactive approach
In addition to securing the operating system, it’s important to update third-party applications such as Adobe Acrobat, Java, and Google Chrome to address vulnerabilities that could be exploited. A proactive approach to patch management provides network security while helping to prevent ransomware and other threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3.3.5 Endpoint Security

A

A host-based security solution is a software application that runs on a local device (or endpoint) to protect it. The software works with the operating system to help prevent attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HOST BASED FIREWALL

A

A host-based firewall runs on a device to restrict incoming and outgoing network activity for that device. It can allow or deny traffic between the device and the network. The software firewall inspects and filters data packets to protect the device from becoming infected. Windows Firewall, installed by default during Windows installation, is an example of a software firewall.

You can control the type of data sent to and from the device by opening or blocking ports. Firewalls block incoming and outgoing network connections unless exceptions are defined to permit or deny traffic to or from those ports. You can select ‘inbound rules’ to configure the types of traffic that are allowed to pass through to the system — this will protect the system from unwanted traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HIDS Host Intrusion Detection System

A

HIDS software is installed on a device or server to monitor suspicious activity. It monitors system calls and file system access to detect malicious requests. It can also monitor configuration information about the device that is held in the system registry.

HIDS stores all log data locally. It is resource-intensive so it can affect system performance. A HIDS cannot monitor network traffic that does not reach the host system, but it can monitor operating system and critical system processes specific to that host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HIPS Hoste Intrusion Prevention System

A

HIPS is software that monitors a device for known attacks and anomalies (deviations in bandwidth, protocols and ports), or finds red flags by assessing the actual protocols in packets. If it detects malicious activity, the HIPS tool can send you an alarm, log the malicious activity, reset the connection, and/or drop the packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EDR Endpoint Detection and Response

A

EDR is an integrated security solution that continuously monitors and collects data from an endpoint device. It then analyzes the data and responds to any threats it detects. An antivirus can only block against threats, while EDR can do that and find threats on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DLP Data Loss Prevention

A

DLP tools provide a centralized way to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NGFW Next Generation Firewall

A

NGFW is a network security device that combines a traditional firewall with other network-device-filtering functions. An example is an application firewall using in-line deep packet inspection (DPI) on an intrusion protection system (IPS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3.3.6 Host Encryption

A

The Windows Encrypting File System (EFS) feature allows users to encrypt files, folders or an entire hard drive. Full-disk encryption (FDE) encrypts the entire contents of a drive (including temporary files and memory). Microsoft Windows uses BitLocker for FDE.

To use BitLocker, the user needs to enable a Trusted Platform Module (TPM) in the BIOS. A TPM is a specialized chip on the motherboard that stores information about the host system, such as encryption keys, digital certificates, and system integrity measurements. When enabled, BitLocker can use the TPM chip.

Similarly, BitLocker To Go is a tool that encrypts removable drives. It does not use a TPM chip, but still encrypts the data, requiring a password to decrypt it. Self-encrypting drives (SEDS) automatically encrypt all data in the drive to prevent attackers from accessing the data through their operating system. SEDS encryption is implemented in the drive hardware by the manufacturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3.3.7 Boot Integrity

A

Attackers can strike at any moment, even in the short space of time it takes for a system to start up. It is critical to ensure that systems and devices remain secure when booting up.

17
Q

What is boot integrity?

A

Boot integrity ensures that the system can be trusted and has not been altered while the operating system loads.

Firmware — software instructions about basic computer functions — is stored on a small memory chip on the motherboard. The basic input/output system (BIOS) is the first program that runs when you turn on the computer.

Unified Extensible Firmware Interface (UEFI), a newer version of BIOS, defines a standard interface between the operating system, firmware and external devices. A system that uses UEFI is preferred over one that uses BIOS because a UEFI system can run in 64-bit mode.

18
Q

How does Secure Boot work?

A

Secure Boot is a security standard to ensure that a device boots using trusted software. When a computer system boots, the firmware checks the signature of each piece of boot software, including UEFI firmware drivers, UEFI applications and the operating system. If the signatures are valid, the system boots, and the firmware gives control to the operating system.

19
Q

What is Measured Boot?

A

Measured Boot provides stronger validation than Secure Boot. Measured Boot measures each component starting with the firmware through to the boot start drivers, and stores the measurements in the TMP chip to create a log. The log can be tested remotely to verify the boot state of the client. Measured Boot can identify untrusted applications trying to load, and it also allows antimalware to load earlier.

20
Q

3.3.8 Apple System Security Features

A

As we know, Windows and Linux distributions include security features that are designed to protect endpoints. Apple provides system hardware and macOS security features that offer robust endpoint protection as well.

21
Q

SECURITY FOCUSED HARDWARE

A

The hardware platform has enhanced security features such as a special security processor, boot integrity, and a dedicated AES encryption engine. These features are included in a special system on a chip called the Secure Enclave.

22
Q

ENCRYPTED STORAGE

A

Apple Data Protection and FileVault data storage encryption are supported by the hardware-based AES encryption engine. This enables encryption and decryption of files as they are written or read without exposing encryption keys to the main CPU, operating system, or running applications.

23
Q

SECURE BOOT

A

The Boot ROM protects low-level hardware and only allows genuine and unaltered Apple OS software to run.

24
Q

SECURE BIOMETRIC DATA

A

Biometric authentication data is processed in the security hardware system. This keeps it segregated from the OS and running application software, including malware.

25
Q

FIND MY MAC

A

Find My Mac helps find lost or stolen macOS devices through its location tracking function. It also enables remote device locking and storage erasing if critical data is at risk.

26
Q

XPROTECT

A

XProtect antimalware technology prevents the execution of malware through signature-based malware detection. It also alerts users to the existence of malware and provides the option to remove detected malware files.

27
Q

MALWARE REMOVAL TOOL (MRT)

A

The Malware Removal Tool (MRT) detects and removes existing malware infections when detection rules are automatically updated by Apple. It also monitors for malware infections at system restart and user login.

28
Q

GATEKEEPER

A

Gatekeeper ensures that only authentic, digitally-signed software that has been created by an Apple-notarized software developer is permitted to be installed.

29
Q

3.3.9 Physical Protection of Devices

A

Computer equipment
To physically protect computer equipment:

Use cable locks to secure devices.
Keep telecommunication rooms locked.
Use security cages (Faraday cages) around equipment to block electromagnetic fields.

Door locks
A standard keyed entry lock is the most common type of door lock. They are often easy to force open. A deadbolt lock can be added for extra security. Any lock that requires a key is vulnerable if the keys are lost, stolen, or duplicated.

A cipher lock uses buttons that are pressed in a given sequence to open the door. It can be programmed so that a user’s code may only work during certain days or times. It can also keep a record of when the door opened, and the code used to open it.

Radio frequency identification (RFID) systems
RFID uses radio waves to identify and track objects. RFID tags can be attached to any item that an organization wants to track. The tags contain an integrated circuit that connects to an antenna. RFID tags are small and require very little power, so they do not need a battery to exchange information with a reader. RFID can help automate asset tracking, or wirelessly lock, unlock, or configure electronic devices. Contactless credit cards use RFID technology.