2.1 - Enterprise Security Flashcards
Define Configuration Management.
Configuration Management is the process of maintaining systems, such as computer hardware and software, in a desired state. This includes identifying and and documenting hardware and software settings.
Define a Network Diagram.
A diagram of the physical wire and devices within a network.
Define a Physical data center layout.
A diagram of the datacenter that gives the layout of the datacenter and can include physical rack locations.
Define a Device Diagram.
A diagram of the individual devices and individual cabling running to them.
Define Baseline Configuration.
A documented set of specifications for an information system, or a configuration item within a system, that has been formally reviewed and agreed on at a given point in time, and which can be changed only through change control procedures.
List some examples of things that should have a standard naming convention within a network.
1) Devices
2) Networks (ports)
3) Domain names and emails
List some ways that data can be protected.
1) Encryption
2) Security Policies
3) Data permissions
Define and explain Data Sovereignty.
Data that resides in a country is subject to the laws of that country (legal monitoring, court orders, etc.)
Laws may prohibit where data is stored. For example, data collected on EU citizens must be stored in the EU. GDPR (General Data Protection Regulation)
Define Data Masking.
Hiding some of the data (like hashing out most of a debit card on a receipt). It may only be hidden from view, but it may be still in storage.
Data masking can be done via substituting, shuffling, encrypting, masking out, etc.
Define Data Encryption.
Encoding information into unreadable data. The original information is plaintext, and the encrypted form is ciphertext.
Define Diffusion.
Changing one character of the input, and many characters change of the output.
If you change one character of plaintext, the whole ciphertext changes.
Define Data at-rest and how to protect it.
Data that is on a storage device.
The data can be encrypted or have permission assigned to it.
Define Data in-transit and how to protect it.
Data that is transmitted over the network.
Can protect it with transport encryption (TLS or IPSec) or Network-based protections (Firewall or IPS).
Define Data in-use.
Data that is actively processing in memory (system RAM, CPU registers and cache). This data is always decrypted.
Define Tokenization.
Replacing sensitive data with a non-sensitive placeholder. The token and the data aren’t mathematically related.
This is common with credit card processing. It uses a temporary token during payment that isn’t useful if captured.
Define Information Rights Management (IRM).
Controls how data is used. It restricts data access to unauthorized persons. Each user has their own set of rights.
Define Data Loss Prevention (DLP).
An approach to data security that implements a set of processes, procedures, and tools to prevent the loss, misuse, or accessed by unauthorized users.
Define Endpoint DLP.
DLP that analyzes an attempts to prevent the loss of data stored on devices.
Define Network DLP.
DLP that attempts to prevent the loss of data in motion.
What does DLP protect if it is on a server?
Data at rest.
What does DLP software do?
Classifies regulated, confidential, and business critical data and identifies violations of policies defined by organizations or within a predefined policy pack, typically drive by regulatory compliance such as HIPAA, PCI-DSS, or GDPR.
Define Cloud-based DLP.
DLP that focuses on keeping communications between the end user and the cloud protected.
It might block custom defined data strings, manage access to URLs, or block viruses and malware.
What are some ways that DLP might be used to protect email?
1) Check every email inbound and outbound
2) Inbound: Block keywords, identify imposters,
quarantine email messages
3) Outbound: Fake wire transfers, W-2 transmissions,
employee information
How might security by affected by geographical changes?
1) There are legal implications
- Business regulations vary between states
- Passports for recovery sites out of the country
2) Offsite backup
- Organization-owned site or 3rd-party secure
facility
3) Offsite recovery
- Travel considerations for staff
- Hosted in site the scope of the disaster