3.2 - Host and Application Security Flashcards
What is anti-virus?
Works to stop and prevent trojans, worms, and macro viruses.
What is anti-malware?
Stops spyware, ransomware, and fileless malware
All malware
What is Endpoint detection and response (EDR)?
Uses behavioral analysis, machine learning, and process monitoring to identify malicious actions on an endpoint.
It investigates the threat then responds based on above.
What is Data Loss Prevention (DLP)?
A set of tools designed to stop the data before an attacker can get to it.
It can be on the endpoint or in cloud-based systems.
What is a Next-generation firewall (NGFW)?
A firewall that handles the OSI Application layer.
AKA
Application layer gateway
Stateful multilayer inspection
Deep packet inspection
Can:
Allow or disallow application features
Identify attacks and malware
Examine encrypted data
Prevent access to URLs or URL categories
What is a host-based firewall?
A software-based firewall that runs on every endpoint.
It can allow or disallow incoming or outgoing application traffic. It is controlled by an application process.
Can identify and block unknown processes.
It can be managed centrally.
What is a Host-based Intrusion Detection System (HIDS)?
Software that uses log files to identify intrusions and can reconfigure firewalls to block.
What is a Host-based Intrusion Prevention System (HIPS)?
Software that recognizes and blocks known attacks. It is often built into an endpoint protection software.
It uses signatures, heuristics, and behavior to identify threats.
It monitors buffer overflows, registry updates, and files being written to the Windows folder. It can access non-encrypted data.
What is a Trusted Platform Module (TPM)?
A cryptographic processor that is often on clients. It can include persistent memory. TPM is password protected.
It can generate random numbers and keys.
A specification for cryptographic functions (hardware to help with encryption functions.
What is Secure Boot?
Part of the UEFI specification that verifies the bootloader.
Checks the bootloader’s digital signature
Bootloader must be signed with a trusted certificate
or a manually approved digital signature
What are some of the protections of a UEFI BIOS?
BIOS includes manufacturer’s public key
Digital signature is checked during a BIOS update
BIOS prevents unauthorized writes to the flash
What is Trusted Boot?
A part of the UEFI BIOS boot process in which the bootloader verifies digital signature of the OS kernel and all other startup components (boot drivers, startup files, etc.)
ELAM (Early Launch Anti-Malware) starts before loading the drivers to check and make sure that they are all trusted. Windows won’t load an untrusted driver.
What is Measure Boot?
A part of the UEFI BIOS boot process that makes sure that nothing on the computer has changed.
UEFI stores a hash of the firmware, boot drivers, and everything else loaded during the Secure Boot and Trusted Boot process. (all stored in TPM)
Remote attestation is done, in which a device provides an operational report to a verification server.
What is tokenization?
Data is replaced with sensitive data with a non-sensitive placeholder. The original data and the token are not mathematically related.
This is used in databases and credit card purchases.
EX. A SSN 266-12-1112 becomes 691-61-8539
What are some ways to protect a database?
1) Tokenization
2) Hashing a password
3) Adding some salt