Threats, Vulnerabilities, and Mitigations 2.5 Flashcards

1
Q

Segmentation (What is it and why is it done)

A

Segment the network into smaller pieces (Physical, Logical or Virtual)
- Performance
- Security
- Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is Segmentation done?

A

Access control lists where control rules are based on source IP, destination IP or port number.

Restrict access to network devices,

Application allow list/deny list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mitigation Techniques - Patching

A

Very important
Third Party Updates
Auto-Updates
Emergency out of band updates .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mitigation Techniques - Encryption

A

Prevent access to application data files
File level encryption
Full disk encryption (Bit locker on Windows and File vault on mac).
Application data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mitigation Techniques - Monitoring

A

Can be done using technology built into switches, routers, firewalls ect

Sensors, intrusion prevention system, firewall logs, Authentication logs

Collectors SIEM consoles (consolidates logs using a correlation engine to compare diverse data), Proprietary Consoles - (IPS, Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Least Privilege

A

Rights and permissions should be set to bare minimum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a posture assessment. what is it for?

A

It is done to enforce configuration of the systems running on your network.

Checks the system to see if all security features are up to date such as a Operating system, updates and patches. Check EDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens if a system fails the posture assessment

A

Systems out of compliance are quarantined or put on a private VLAN with limited access so updates to security can be made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Decommissioning

A

May be sensitive data on old devices so there should be a formal policy for devices which are no longer in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

System Hardening Techniques - Encryption

A

Encrypt data using Windows encrypting file system (EFS)
Full Disk Encryption (FDE)
Windows Bitlocker, macOS Filevault
Encrypt Network device communication with VPN or HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

System Hardening Techniques - Installation of endpoint protection

A

EDR (End point detection point) - A different method of threat protection to meet the increasing number of threats.

EDR is able to detect and investigate a threat threat,

EDR will respond to a threat, isolate the system and quarantine the threat. Even roll back to a previous configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System Hardening Techniques - Host based firewall

A

Software firewall allows and disallows incoming or out-coming application traffic which runs on every end point and can be managed centrally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System Hardening Techniques - Host based intrusion prevention system (HIPS)

A
  • Recognise and block known attacks
  • Secure OS and application configurations
    -Often built into endpoint protection software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

System Hardening Techniques - Ports/Protocols

A

Closing ports because every open port is a possible entry point.
Control port access with firewall (NGFW)
Applications with broad port ranges -Open port 0-65,535
Use Nmap to scan port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

System Hardening - Default password changes

A

Change default settings when you set up applications. Change default settings. Multi-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

System Hardening - Removal of Unnecessary Software

A

Remove all unused software because every application could have secuirty concerns.