7.1 Operating Systems Security P1 Flashcards

1
Q

Define what is OS hardening host security

A

Addressing the weaknesses in the (default) OS installation & applications configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 steps suggested by Andress to harden the security of the OS

A
  1. Understand functions that the system will perform (and set it up for that)
  2. Apply all the vendor-recommended security patches
  3. Install security monitoring programs
  4. Audit system configuration
  5. Design backup & recovery procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the problems that come with OS hardening?

A

OS typically comes ready for ‘easy’ installation standard setup / configuration, passwords (defaults)
Easy & repeatable so others will know way round system
Much activity will revolve around “just getting it up and working” - some security aspects will be an after thought
Teething - also will be the novice when setting up the new system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How should managing the OS hardening be done?

A

Need to replace ‘standard’ set-ups / accounts / access (i.e. easy installation elements)
Continual monitoring & checking (audits)
Manage the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is involved in security server hardening?

A

Different servers can run on a host machine (host can be set up to run specific server)
Server perform specific functions (firewalls, web servers, database servers, email servers, SMS servers, DNS)

Server security
Range from simple configuration options in server application to installing extra security products
Adding extra layers of security to ensure server is secure & protecting rest of system from security breach via server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is involved in Client OS security?

A

Client machines may also need ‘hardening’
Locking down clients systems to ensure its not providing too much access or running too many unnecessary services
Need to replace ‘standard’ set-ups / accounts / access (i.e. easy installation elements)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What in involved in mobile device hardening?

A

Defining and setting use policies
Examples of Apple iPhone / iPad & Galaxy’s with remote disabling
Very relevant for BYOD (Bring Your Own Device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly