2.2 Security controls for host devices Flashcards

Analyze a scenario to integrate security controls for host devices to meet security requirements (42 cards)

1
Q

SELinux

A

-Group of security extensions that can be added to Linux to provide additional security enhancements to the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SEAndroid

A

-The SELinux extensions added to the android OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Least functionality

A

-requirement that only the necessary privileges are granted users to access resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TrustedSolaris

A
  • DEPRECATED

- Was a group of security-evaluated OSs based on earlier versions of Solaris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anti-Malware

A

-general purpose security tool designed to prevent, detect and eradicate multiple forms of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-Spyware

A

specifically targets the removal of spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spam filter

A

identifies malicious or undesirable e-mails and prohibit them from invading the user’s mailboxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Patch Management

A

the process of acquiring, testing, deploying, and maintaining a patching solution for an organization’s devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HIPS/HIDS

A

-Host Intrusion Prevention System/Host Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DLP

A
  • Data loss prevention

- prevents desirable and sensitive materials from leaving the corporate boundary unless the policy permits it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Host-based Firewalls

A

Control which traffic is allowed or denied from entering and exiting the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Log Monitoring

A

The process of examining host logs in order to detect signs of malicious activity on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EDR

A
  • Endpoint Detection Response
  • initially monitor a threat by collecting event information from memory, processes, the registry, users, files, and networking and then upload the data to a local or centralized database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Standard operating environment

A

a pre-defined disk image of an operating system, applications, and configurations to provide consistent host device experiences across the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Configuration Baselining

A

standardizing configurations across applications or operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application Whitelisting

A

Focuses on explicitly allowing only certain applications to the exclusion of all others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Application Blacklisting

A

Focuses explicitly denying only certain applications to the exclusion of all others

18
Q

Security/Group Policy implementation

A

Group policy is a set of rules that provides for centralized management and configuration of the operating system, user configurations, and applications

19
Q

Command Shell restrictions

A

limits what commands are available to users and IT personnel

20
Q

Manual vs automated Patch management

A
  • manual patch management improves control

- automated improves speed

21
Q

Configuring dedicated interfaces

A

-necessary to ensure that an interface is isolated from other interfaces and traffic flow patterns

22
Q

Out-of-band Management

A

-a dedicated interface that requires a separate communication channel

23
Q

ACLs

A
  • Access Control Lists

- use packet filters to lock down network interfaces

24
Q

Management interface

A

Dedicated physical port, or VLAN logical port, that permits in-band management of host devices

25
Data Interface
Everyday communications channels that exist between hosts and network appliances like switches
26
External I/O restrictions
Disable USB devices as well as wireless technologies - bluetooth - NFC - 802.11 - IrDA - RFID
27
Drive mounting
-permits a user to map a drive on another system to a local drive letter on their computer
28
Drive mapping
permits a user to map a drive on another system to a local drive letter on their computer
29
Webcam
should be disabled or used sparingly to prevent spyware or other attacks from hijacking these devices
30
SD port
restrict the traffic on these ports
31
HDMI
restrict due to possibility of attackers using these cables to hijack the audio and video output of your devices
32
file and disk encryption
necessary for providing independent encryption capabilities to files and folders on a file system -Disk encryption encrypts the entire disk, volume, or external drive from various online and offline attackers
33
Firmware updates
critical to securing devices from attacks that focus on outdated firmware
34
Secure boot
feature made available through UEFI firmware and will only load trusted, digitally signed boot files as per the OEM
35
Measured Launch/Boot
uses TPM chips to measure the crytographic integrity of several boot components through the use of digital signatures
36
Integrity Measurement Architecture
- IMA | - an open source method frequently used on linux
37
BIOS
Firmware chip stored on device motherboards that perform the hardware initialization and the subsequent OS startup
38
UEFI
``` firmware chip that adds various security features missin from BIOS -faster speeds -larger partition sizes -Secure Boot and Measured boot Ability to use more memory ```
39
Attestation Services
TPM chips provide attestation services to authenticate the identity and integrity of software
40
TPM
A secure chip that contains a cryptoprocessor built into modern computer motherboards for the purpose of performing various security functions relating to certificates, symmetric and asymmetric keys, and hashing
41
Vulnerabilities associated with hardware
Older PCs devices lacking UEFI and TPMs jailbroken hardware
42
Terminal Services/application delivery services
Microsoft renamed terminal services to Remote Desktop Services - Uses remote desktop protocol - client offloads resources responsibilities onto a server