Chapter 11 Flashcards
Endpoint Security (62 cards)
What are ways an OS can be Vulnerable?
-Vulnerabilities in the OS itself
-Defaults like default passwords and insecure settings
-Configurations. Though Intentional, can still be vulnerable.
-Misconfiguration caused by human error.
Firmware
The embedded software that allows devices to function. Tightly connected to the device and may not be possible to update.
MoonBounce Malware
Sophisticated firmware-level malware that infects a computer’s UEFI firmware.
Unified Extensible Firmware Interface
(UEFI)
Modern replacement for Basic Input/Ouput System. (BIOS).
Secure Boot
A feature of (UEFI) that aims to protect the operating environment of the local system by preventing the loading or installing of device drivers or an operating system that is not signed by a preapproved digital certificate. Secure boot thus protects systems against a range of low-level or boot-level malware, such as certain rootkits and backdoors.
OEM
Original Equipment Manufacturer
Measure Boot
A boot process that provides a trusted log of all components like drivers and other components loaded during a boot process.
Trusted Platform Module (TPM)
A specification for a cryptoprocessor as well as the chip in a mainboard supporting this function. A TPM chip is used to store and process cryptographic keys for the purposes of a hardware- supported or implemented hard drive encryption system.
Hardware root at Trust
The foundation of security in computing systems.
What are the 3 major funcitons of TPM chips?
- Remote Attestion: Allowing hardware and software to be verified
- Binding: Encrypts Data
- Sealing: Encrypts Data and sets requirements for the state of the TPM chip before decryption.
Physically Unclonable Functions (PUFs)
Preserving Boot Integrity
Unique to the specific hardware device that provide a unique identifier or digital fingerprint for the device.
Apple’s Secure Enclave
A dedicated secure element that is built into Apple’s system on chip (SoC) modules.
Where are HSMs often used?
HSMs are often used in high-security environments and are normally certified to meet standards like federal information processing standards (FIPS) 140 or Common Criteria (ISO/IEC 15408).
Key Management Systems (KSMs)
Used to store keys and certificates as well as to manage them centrally.
Signature-Based Detection
Endpoint Security Tools
Uses a hash or pattern-based signature detection method to identify files or components of the malware that have been previously observed.
Polymorphism
Attacker Technique
A technique used by malware to constantly change its code while maintaining its functionality. This makes it difficult for traditional antivirus programs to detect and block the threat.
Heurisitic or Behavior-based Detection
Endpoint Security Tools
An intrusion discovery mechanism used by intrusion detection systems (IDSs). Behavior- based detection finds out about the normal activities and events on your system by watching and learning. After it has accumulated enough data about normal activity, it can detect abnormal and possible malicious activities and events. Also known as statistical intrusion detection, anomaly detection, and heuristics- based detection.
Sandboxing
Endpoint Security Tools
A security technique that provides a security boundary for applications and prevents the application from interacting with other applications. Antimalware applications use sandboxing techniques to test unknown applications. If the application displays suspicious characteristics, the sandboxing technique prevents the application from infecting other applications or the operating system.
Allow lists / White Lists
It allows you to create a list of software, applications, and other system components that are allowed to exist and run on a system. If they are not on the list, they will be removed and disabled, or they will not be able to install.
Deny Lists / Black Lists
Lists of software or applications that cannot be installed or run, rather than a list of what is allowed.
Endpoint Detection and Response (EDR)
EDR tools combine monitoring capabilities on endpoint devices and systems using a client or software agent with network monitoring and log analysis capabilities to collect, correlate, and analyze events.
Extended Detection and Response (XDR)
XDR is similar to EDR but has a broader perspective considering not only endpoints but the full breadth of an organization’s technology stack, including cloud services, security services and platforms, and similar components.
What are key elements of DLP?
The ability to classify data so that organizations know which data should be protected; policy management and enforcement functions used to manage data to the stnadards set by the organization; and monitoring and reporting capabilities to quickly notify administrators or security practitioners about issues or potential problems.
Host-Based Firewalls
Network Defenses
Built into most modern operating systems and are typically enabled by default.