Chapter 5 Flashcards

Securing Hosts and Data

1
Q

Least Functionality

A

A core principle of secure systems design

Systems should be deployed with only the applications, services, and protocols needed to meet their purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trusted Operating System

A

An operating system that is configured to meet a set of security requirements

It ensures that only authorized personnel can access data based on their permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Patch Management

A

The process used to keep systems up to date with current patches

It typically includes evaluating and testing patches before deploying them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Change Management

A

The process used to prevent unauthorized changes

Unauthorized changes often result in unintended outages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application whitelist

A

A list of application that a system allows

Users are only able to install or run applications on the list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Blacklist

A

A list of applications that a system blocks

Users are unable to install or run any applications on the list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sandboxing

A

The use of an isolated area on a system, typically for testing

Virtual machines are often used to test patches in an isolated sandbox

Application developers sometimes use the chroot command to change the root directory crating a sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Chroot

A

A Linux command used to change the root directory

It is often used for sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EMI

A

Electromagnetic interference is an interference caused by motors, power lines, and fluorescent lights

EMI shielding prevents outside interference sources from corrupting data and prevents data from emanating outside the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EMP

A

Electromagnetic Pulse is a short burst of energy that can potentially damage electronic equipment

It can result from electrostatic discharge (ESD), lightning, and military weapons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FDE

A

Full disk encryption is a method to encrypt an entire disk

Compared with SED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SED

A

Self-encrypting drive is a device that includes he hardware and software necessary to encrypt a hard drive

Users typically enter credentials to decrypt and use the drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BIOS

A

Basic Input/Output System is a computers firmware used to manipulate different settings such as the date and time, boot drive, and access password

UEFI is the designated replacement for BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UEFI

A

Unified Extensible Firmware Interface is a method used to boot some systems and intended to replace BIOS firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TPM

A

Trusted Platform Module is a hardware chip on the motherboard included with many laptops and some mobile devices

It provides full disk encryption

Compare with HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure Boot

A

A process that checks and validates system files during the boot process

A TPM typically uses a secure boot process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attestation

A

A process that checks and validates system files during the boot process

TPMs sometimes used remote attestation, sending a report to a remote system for attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hardware Root of Trust

A

A known secure starting point

TPMs have a private key burned into the hardware that provides a hardware root of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HSM

A

Hardware security module is a removable or external device that van generate, store, and manage RSA keys used in asymmetric encryption

Compare wirh TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SaaS

A

Software as a Service is a cloud computing model that provides applications over the internet

Webmail is an example of a cloud based technology

Compare with IaaS and PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PaaS

A

Platform as a Service is a cloud computing model that provides cloud customers with a preconfigured computing platform they can use as needed

Compare with IaaS and SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IaaS

A

Infrastructure as a service is a cloud computing model that allows an organization to rent access to hardware in a self-managed platform

Compare with PaaS and SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CASB

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cloud Deployment models

A

Cloud model types that identify who has access to cloud resources

Public clouds are for any organization

Private clouds are for a single organization

Community clouds are shared among community organizations

A hybrid cloud is a combination of two or more clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
MDM
Mobile device management is a group of applications and/or technologies used to manage mobile devices MDM tools can monitor mobile devices and ensure they ate in compliance with security policies
26
Application Management
Filler
27
Full Device Encryption
Filler
28
Storage Segmentation
A method used to isolate data on mobile devices It allows personal data to be stored in one location and encrypted corporate data to be stored elsewhere
29
Content management
Filler
30
Containerization
A method used to isolate applications in mobile devices It isolates and protects the application, including any data used by the application
31
Passwords and PINs
Filler
32
Biometrics
Filler
33
Screen Locks
Filler
34
Remote Wipe
The process of sending a signal to a remote device to erase all data It is useful when a mobile device is lost or stolen
35
Geolocation
The location of a device identified by GPS It can help locate a lost or stolen mobile device
36
Geofencing
A virtual fence or geographic boundary It uses GPS to create the boundary Apps can then respond when a mobile device is within the virtual fence
37
GPS Tagging
A process of adding geographical data to files such as pictures It typically includes latitude and longitude coordinates of the location where the picture was taken or the file was created
38
Context-Aware
An authentication method using multiple elements to authenticate a user and a mobile device It can include identity, geolocation, the device type, and more
39
Push Notification Services
The services that messages to mobile devices
40
Third Party App Store
An app store other than the primary source for mobile device apps It refers to an app store other than the App Store or Google Play for Apple and Android devices, respectively
41
Jailbreaking
The process of modifying an Apple mobile device to remove software restrictions It allows a user to install software from any third-party source Compare with rooting
42
Rooting
The process of modifying an Android device, giving the user root-level, or administrator, access Compare with Jailbreaking
43
Firmware OTA Updates
Over-the-air updates for mobile device firmware that keep them up to date These are typically downloaded to the device from the Internet and applied to update the device
44
Custom Firmware
Mobile device firmware other than the firmware provided with the device People sometimes use custom firmware to root Android devices
45
Sideloading
The process of copying an application package to a mobile device It is useful for developers when testing apps, but can be risky if users sideload unauthorized apps to their device
46
SMS
Short Message Service is a basic text messaging service Compare with MS
47
MMS
Multimedia Messaging Service is a method used to send text messages It is an extension of SMS and supports sending multimedia content
48
USB OTG
Universal Serial Bus On-The-Go is a cable used to connect mobile devises to other devices It is one of many methods that you can use to connect a mobile device to external media
49
Tethering
The process of sharing an Internet connection from one mobile device to another
50
Wi-Fi Direct
A standard that allows devices to connect without a wireless access point
51
Carrier Unlocking
The process of unlocking a mobile phone from a specific cellular provider
52
Embedded System
Any device that has a dedicated function and uses a computer system to perform that function It includes a CPU, an operating system, and one or more applications
53
IoT
Internet of things is the network of physical devices connected to the Internet It typically refers to smart devices with an IP address, such as wearable technology and home automation systems
54
Wearable Technology
Smart devices that a person can wear or have implanted
55
Home Automation
Smart devices used within the home that have IP addresses These are typically accessible via the Internet and are part of the Internet of things (IoT)
56
SoC
System on a chip is an integrated circuit that includes a computing system within the hardware Many mobile devices include an S0C
57
ICS
Industrial control system is a system that controls large systems such as power plants or water treatment facilities A SCADA system controls the ICS
58
SCADA
Supervisory control and data acquisition is a system used to control an ICS such as power plant or water treatment facility Ideally, a SCADA is within an isolated network
59
RTOS
Real-time operating system is an operating system that reacts to input within a specific time Many embedded systems include an RTOS
60
HVAC
Heating, ventilation, and air conditioning is a physical security control that increases availability by regulating airflow within data centers and server rooms
61
UAVs
Unmanned aerial vehicles are flying vehicles piloted by remote control or onboard computers
62
EFS
Filler
63
NTFS
Filler
64
ACLs
Access control lists are lists of rules used by routers and stateless firewalls These devices use the ACL to control traffic based on networks, subnets, IP addresses, ports, and some protocols
65
GPG
Filler
66
Linux Permissions
Filler
67
Windows Permissions
Filler
68
DLP
Data loss prevention is a group of technologies used to prevent data loss They can block the use of the USB devices, monitor outgoing email to detect and block unauthorized data transfers, and monitor data stored in the cloud
69
Data Exfiltration
The unauthorized transfer of data outside an organization