Módulo 08 - Network and Endpoint Security Flashcards
(239 cards)
Define: OS Hardening
Enhancing an operating system’s security by removing unnecessary components, limiting access, and applying best practices.
Define: Access Control Lists (ACLs)
Rules defining user permissions to resources, such as files or networks, based on identifiers and associated privileges.
Define: Full Disk Encryption (FDE)
Encryption that protects all data on a hard drive, including system files and user data, even when the OS is off.
Acronym:
PoLP
Principle of Least Privilege.
Acronym:
S/MIME
Secure/Multipurpose Internet Mail Extensions.
Compare:
Endpoint Protection vs. Patch Management
Endpoint Protection: Focuses on safeguarding devices against malware and threats.
Patch Management: Addresses vulnerabilities by applying updates and patches.
List:
Key elements of endpoint hardening.
- Remove unnecessary software.
- Change default passwords.
- Apply configuration enforcement.
- Implement encryption techniques.
- Use access control policies.
- Monitor for changes and compliance.
List:
Types of encryption techniques.
- Full Disk Encryption (FDE).
- Removable Media Encryption.
- Virtual Private Networks (VPNs).
- Email Encryption.
Define:
Implicit Deny ACLs
A rule that denies access unless explicitly allowed, ensuring tighter security by default.
Define:
Authorization Creep
Gradual accumulation of unnecessary privileges by a user due to improper privilege management.
Define:
Deprovisioning
The process of removing access rights and permissions when an employee or contractor leaves or a project ends.
Acronym:
FSRM
File Server Resource Manager.
Acronym:
FTPS
FTP Secure
which adds SSL/TLS to FTP for secure logon and data transfer.
Acronym:
SFTP
Secure Shell File Transfer Protocol.
Define:
FSRM Quotas
Storage limits on a directory.
Hard (Block further storage) or Soft (Only alerts)
Define:
File Screens on FSRM
Rules tha restrict file types that might be saved on a directory
Define:
NetBIOS
Network protocol for file and printer sharing, quite unsecure.
Define:
Tombstone File
File replaced that informs about a violation, keeping the original unaccessible
Acronym:
IPSec
Internet Protocol Security
Acronym:
SCP
Secure Copy Protocol
Define:
Administrative Share
Hidden directory that only admins have access
Compare:
SFTP vs. FTPS
SFTP: Secure Shell-based, not related to FTP, uses SSH2 for secure data transfer.
FTPS: FTP with SSL/TLS, requires server certificates for encrypted communication.
Compare:
Hard Limit vs. Soft Limit in Quotas
Hard Limit: Prevents users from exceeding the data quota.
Soft Limit: Allows exceeding the quota but sends a warning message.
List:
DLP Remediation methods
- Alert only: Registra o incidente sem bloquear o acesso.
- Block: Impede a cópia, mas mantém o arquivo acessível.
- Quarantine: Restringe o acesso ao arquivo original.
- Tombstone: Substitui o arquivo por uma mensagem de violação de política.