2.6 - Security Best Practices Flashcards

1
Q

Data encryption

A
  • Full-disk encryption
    – Encrypt data-at-rest
  • File system encryption
    – Individual files and folders
  • Removable media
    – Protect those USB flash drives
  • Key backups are critical
    – You always need to have a copy
    – This may be integrated into Active Directory
    – You’ll want to keep the key handy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Password complexity and length

A
  • Make your password strong
    – Resist guessing or brute-force attack
  • Increase password entropy
    – No single words, no obvious passwords
    – Mix upper and lower case and use special characters
  • Stronger passwords are at least 8 characters
    – Consider a phrase or set of words
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Password expiration and recovery

A
  • All passwords should expire
    – Change every 30 days, 60 days, 90 days
    – System remembers password history,
    requires unique passwords
  • Critical systems might change more frequently
    – Every 15 days or every week
  • The recovery process should not be trivial!
    – Some organizations have a very formal process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Password best practices

A
  • Changing default usernames/passwords
    – All devices have defaults
    – There are many web sites that document these
  • BIOS/UEFI passwords
    – Supervisor/Administrator password:
    Prevent BIOS changes
    – User password: Prevent booting
  • Requiring passwords
    – Always require passwords
    – No blank passwords
    – No automated logins
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

End-user best practices

A
  • Require a screensaver password
    – Integrate with login credentials
    – Can be administratively enforced
  • Does not require user intervention
    – Automatically locks after non-use or timeout
  • Secure critical hardware
    – Laptops can easily walk away -
    – Lock them down
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Securing PII and passwords

A
  • Personally identifiable information
    – Name, address, social security number, etc.
  • Control your input
    – Be aware of your surroundings
  • Use privacy filters
    – It’s amazing how well they work
  • Keep your monitor out of sight
    – Away from windows and hallways
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Account management

A
  • User permissions
    – Everyone isn’t an Administrator
    – Assign proper rights and permissions
    – This may be an involved audit
  • Assign rights based on groups
    – More difficult to manage per-user rights
    – Becomes more useful as you grow
  • Login time restrictions
    – Only login during working hours
    – Restrict after-hours activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disabling unnecessary accounts

A
  • All operating systems include other accounts
    – Guest, root, mail, etc.
  • Not all accounts are necessary
    – Disable/remove the unnecessary
    – Disable the guest account
  • Disable interactive logins
    – Not all accounts need to login
  • Change the default usernames
    – User:admin Password:admin
    – Helps with brute-force attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Locking the desktop

A
  • Failed password attempts
    – Should lock the account and/or reboot after
    a certain threshold
    – Prevents online brute force attacks
  • Automatically lock the system
    – After a certain amount of inactivity
    – Or when you walk away
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AutoRun and AutoPlay

A
  • Disable AutoRun on older OSes
    – autorun.inf in Vista
    – No Autorun in Windows 7, 8/8.1, 10, or 11
    – Disabled through the registry
  • Disable AutoPlay
    – Configure in Settings >
    Bluetooth & devices >
    AutoPlay
  • Get the latest security patches
    – Updates to autorun.inf and AutoPlay
How well did you know this?
1
Not at all
2
3
4
5
Perfectly