2.2 Security controls for host devices Flashcards

Analyze a scenario to integrate security controls for host devices to meet security requirements

1
Q

SELinux

A

-Group of security extensions that can be added to Linux to provide additional security enhancements to the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SEAndroid

A

-The SELinux extensions added to the android OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Least functionality

A

-requirement that only the necessary privileges are granted users to access resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TrustedSolaris

A
  • DEPRECATED

- Was a group of security-evaluated OSs based on earlier versions of Solaris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anti-Malware

A

-general purpose security tool designed to prevent, detect and eradicate multiple forms of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-Spyware

A

specifically targets the removal of spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spam filter

A

identifies malicious or undesirable e-mails and prohibit them from invading the user’s mailboxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Patch Management

A

the process of acquiring, testing, deploying, and maintaining a patching solution for an organization’s devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HIPS/HIDS

A

-Host Intrusion Prevention System/Host Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DLP

A
  • Data loss prevention

- prevents desirable and sensitive materials from leaving the corporate boundary unless the policy permits it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Host-based Firewalls

A

Control which traffic is allowed or denied from entering and exiting the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Log Monitoring

A

The process of examining host logs in order to detect signs of malicious activity on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EDR

A
  • Endpoint Detection Response
  • initially monitor a threat by collecting event information from memory, processes, the registry, users, files, and networking and then upload the data to a local or centralized database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Standard operating environment

A

a pre-defined disk image of an operating system, applications, and configurations to provide consistent host device experiences across the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Configuration Baselining

A

standardizing configurations across applications or operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application Whitelisting

A

Focuses on explicitly allowing only certain applications to the exclusion of all others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Application Blacklisting

A

Focuses explicitly denying only certain applications to the exclusion of all others

18
Q

Security/Group Policy implementation

A

Group policy is a set of rules that provides for centralized management and configuration of the operating system, user configurations, and applications

19
Q

Command Shell restrictions

A

limits what commands are available to users and IT personnel

20
Q

Manual vs automated Patch management

A
  • manual patch management improves control

- automated improves speed

21
Q

Configuring dedicated interfaces

A

-necessary to ensure that an interface is isolated from other interfaces and traffic flow patterns

22
Q

Out-of-band Management

A

-a dedicated interface that requires a separate communication channel

23
Q

ACLs

A
  • Access Control Lists

- use packet filters to lock down network interfaces

24
Q

Management interface

A

Dedicated physical port, or VLAN logical port, that permits in-band management of host devices

25
Q

Data Interface

A

Everyday communications channels that exist between hosts and network appliances like switches

26
Q

External I/O restrictions

A

Disable USB devices as well as wireless technologies

  • bluetooth
  • NFC
  • 802.11
  • IrDA
  • RFID
27
Q

Drive mounting

A

-permits a user to map a drive on another system to a local drive letter on their computer

28
Q

Drive mapping

A

permits a user to map a drive on another system to a local drive letter on their computer

29
Q

Webcam

A

should be disabled or used sparingly to prevent spyware or other attacks from hijacking these devices

30
Q

SD port

A

restrict the traffic on these ports

31
Q

HDMI

A

restrict due to possibility of attackers using these cables to hijack the audio and video output of your devices

32
Q

file and disk encryption

A

necessary for providing independent encryption capabilities to files and folders on a file system
-Disk encryption encrypts the entire disk, volume, or external drive from various online and offline attackers

33
Q

Firmware updates

A

critical to securing devices from attacks that focus on outdated firmware

34
Q

Secure boot

A

feature made available through UEFI firmware and will only load trusted, digitally signed boot files as per the OEM

35
Q

Measured Launch/Boot

A

uses TPM chips to measure the crytographic integrity of several boot components through the use of digital signatures

36
Q

Integrity Measurement Architecture

A
  • IMA

- an open source method frequently used on linux

37
Q

BIOS

A

Firmware chip stored on device motherboards that perform the hardware initialization and the subsequent OS startup

38
Q

UEFI

A
firmware chip that adds various security features missin from BIOS
-faster speeds
-larger partition sizes
-Secure Boot and Measured boot
Ability to use more memory
39
Q

Attestation Services

A

TPM chips provide attestation services to authenticate the identity and integrity of software

40
Q

TPM

A

A secure chip that contains a cryptoprocessor built into modern computer motherboards for the purpose of performing various security functions relating to certificates, symmetric and asymmetric keys, and hashing

41
Q

Vulnerabilities associated with hardware

A

Older PCs
devices lacking UEFI and TPMs
jailbroken hardware

42
Q

Terminal Services/application delivery services

A

Microsoft renamed terminal services to Remote Desktop Services

  • Uses remote desktop protocol
  • client offloads resources responsibilities onto a server