2.1: Enterprise Security Flashcards

1
Q

Configuration Management

A

The only constant is change.
Identify and document hardware and software settings.
Rebuild those systems if a disaster occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Baseline configuration

A

security of an app evironment should be well defined.
Firewall settings, patch levels, OS file versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Standard naming conventions

A

Create a standard, needs to be understood by everyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP Schema

A

Ip address plan or model
consistent addressing for network devices. Helps avoid duplicates.
Reserved addresses: Printers, routers etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protecting Data

A

Data is everywhere, on a storage drive, on the network, in a CPU.
Protecting the data with encryption, security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data sovereignty

A

data that resides in a country is subject to the laws of that country.
laws may prohibit where data is stored.
GDPR (General Data Protection Regulation) - Data collected on EU citizens must be stores in EU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Masking

A

Data obfuscation-hide some of the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Encryption

A

Encode plaintext into cypertext
Two way street, convert between one and the other if you have a proper key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data at-rest

A

Data is on a storage device
encryption can be individual or whole disk encryption
Apply permissions to limit access on a per user basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data In-Transit

A

Data transmitted over the network
Not much protection as it travels
Network based protection through firewall, IPS
Transport encryption TLS, IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data In-use

A

In RAM, Caches or CPU register.
almost always decrypted.
can be picked straight out of ram by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tokenization

A

Replace sensitive data with a non sensitive placeholder
Not encryption or hashing, no overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing

A

Represent data as a short string of text(message digest)
One way trip, can’t unhash a hash to get the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hot Site

A

Exact replica and duplicate of everything, ready to go at a moments notice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cold Site

A

No hardware, empty building.
No data or people, everything has to be brought.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeypot

A

system or series of systems that look very attractive to an attacker.

17
Q

Honeynet

A

multiple honeypots to gather info from multiple sources.

18
Q

Honeyfiles

A

Attractive bait inside the honeynet. alert is sent if file is accessed.
virtual bear trap.

19
Q

DNS sinkhole

A

gives a reponse back with incrorrect/bad info.
Useful to redirect machines infected to track a known site that malware infected machines would try and visit.

20
Q
A