Chapter 3.3 Flashcards

1
Q

HSM

A

A Hardware Security Module (HSM) is a device used to generate, maintain and store cryptographic keys. It can be an external device and can easily be added to a system. The HSM will maintain the integrity of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TPM

A

The Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system and provides secure key storage for full disk encryption. Supports secure boot processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SoC

A

A system on a chip includes all the functionality of a system in a compact solution. Mobile computing devices typically have this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hardware root of trust

A

A hardware root of trust is a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MLS

A

Multi-Level Security (MLS) is an implementation of MAC that focuses on confidentiality. A MLS operating system is able to enforce the separation of multiple classifications of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardening

A

Hardening an Operating System (OS) is the practice of removing default values to ensure the system is more secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure configuration of systems

A

Secure configuration of systems refers to security measures that are implemented as a way to provide protection for computer systems. Secure configurations of systems can help prevent vulnerabilities and attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FDE

A

Full Device Encryption (FDE) provides encryption for a whole disk and protects the confidentiality of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SED

A

A self-encrypting drive (SED) includes both the hardware and software to encrypt data on a drive. Keys are securely stored within for decryption. SED requires credentials to be entered for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

privacy screens

A

The use of privacy screens limits the view from a display. They can be used to protect sensitive information from being visible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

mail gateways

A

A mail gateway examines incoming and outgoing email traffic. It can be configured to inspect email traffic for certain terms and force encryption based on policies. An email gateway can also deny email traffic that it views as vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

URL filtering

A

A URL filter allows you to control access to websites by permitting or denying access to specific websites based on information contained in a URL list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EMI

A

Electromagnetic interference (EMI) are radio frequencies emitted by external sources, such as power lines that disturb signals. EMI can be avoided by the use of shielding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BIOS

A

Basic Input/Output System (BIOS) is a combination of hardware and software used to adjust settings in a computer.
Disabling USB ports in BIOS (Basic Input/Output System) for all workstations on the company network would turn off the ability to use a USB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UEFI

A

Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer’s firmware to its operating system. UEFI is the replacement for BIOS (Basic Input/Output System) and has many advancements to include provisions for secure booting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attestion

A

Attestation is the process of checking and validating system files during a boot process.

17
Q

patch management

A

Patch management refers to the process of maintaining and updating software applications to maintain availability. It entails testing and applying each patch as soon as they are available.

18
Q

Change management

A

Change Management is a process that involves the prevention of unauthorized changes to a system. This process protects from unwanted outages.

19
Q

incident management

A

Incident management is the process put in place to identify, analyze and correct incidents that cause downtime or disruption of services.

20
Q

EMP

A

Electromagnetic Pulses (EMP) are bursts of electromagnetic energy from sources such as lightning, high-velocity weapons, or other devices. Shielding a system can help mitigate EMP. A Faraday Cage is an example of a shielding solution.