3.2 Flashcards
(42 cards)
Endpoint Protection
It is the concept of extending security perimeters to the devices that are connecting to the network. Endpoint protection solutions include HIDS/HIPS, firewalls, antivirus, DLP solutions, etc.
Antivirus
Antivirus attempts to identify, neutralize, or remove malicious programs, macros, and files. Signature-based looks for known signatures of malware. Heuristic-based searches for suspicious behavior from programs that allude to malware.
Anti-Malware
It is a product that is designed to protect your machine from malicious software or malware.
Endpoint Detection and Response (EDR)
EDR combines individual endpoint security functions into a complete package. It can include antivirus, anti-malware, software patching, firewall, and DLP solutions.
Data loss prevention (DLP)
DLP serves to prevent data from leaving a network unnoticed. DLP monitoring will take whatever file activity and send the reports to a centralized system.
Next-Generation Firewall (NGFW)
NGFW will actually analyze the content of the traffic that is coming through and not just the source and destination IPs or ports. The challenge is to make sure the rulesets are up-to-date and able to catch the anomalous traffic coming in.
Host-based Intrusion Detection System (HIDS)
HIDS will detect undesired elements that are affecting the hosts endpoints that it is assigned to. It tailors it’s detection to the host OS.
Host-based Intrusion Prevention System (HIPS)
A HIPS is able to act like a HIDS but is capable of acting on it and respond automatically to a threat condition. It detects and prevents.
Host-based Firewall
These are software-based firewalls that monitor and control traffic passing and and out of a single system.
Linux has IPTables, TCP Wrapper, IPChains
Windows has Windows Defender Firewall
Boot Integrity
Process of a system powering up and loading and running the correct hardware/firmware/software needed in compliance with the expected state.
Boot Security/Unified Extensible Firmware Interface (UEFI)
UEFI offers Secure Boot, which only will boot signed drivers and OS loaders. It also uses attestation to ensure that these drivers and loaders haven’t been changed since approved to use.
Measured Boot
Measured boot depends on the Root of Trust in starting the system, but uses hashes of the processes running to compare to known-good hashes. This is good because signatures are harder to come by.
Boot Attestation
Boot attestation reports the state of a system between components and Root of Trust through digital signatures.
Database
Databases can have encryption that protects against any database compromise while performance hits are negligible.
Tokenization
Tokenization is substituting a value instead of the actual sensitive data to guard against disclosing that data. It is a referential integrity option.
Salting
Salting is adding a random value to the end of a password before performing hashing. This will change the outcome hash even if two users have identical passwords.
Hashing
Mathematical operation of reducing a data element into an outcome that is not reversible.
Application security
We need application security since OSs and infrastructure software has addressed many of the vulnerabilities over the years. In-house software is much less likely to have security reviews and this means they are more likely to have vulnerabilities.
Input Validations
Having comprehensive and stringent validation of inputs will help guard against any unwanted outcomes for an attacker to exploit. It will prevent many types of attacks.
Secure Cookies
Cookies have an attribute that secures cookies to send the data over HTTPS and thus, encrypts the data from attackers seeing it.
Hypertext Transfer Protocol (HTTP) Headers
These HTTP headers are vulnerable to risks such as protocol downgrade attacks, clickjacking, cookie hijacking and other attacks. That’s why HTTPS is better because it encrypts your data.
Code Signing
Code signing is adding a digital signature to code to verify the integrity of the code and show evidence of the source of the software.
Allow List
Allow lists are lists of applications that are allowed to run on a machine using hashes to verify they are not corrupted. These are easy to use on a single-purpose machine but a multi-purpose one makes these lists a lot more complex.
Block List/Deny List
A block list/deny list is a list the explicitly states what applications are not allow to run on a machine. This list is easier to exploit by making minor changes to the software and thus changing the hashes.