Secure Device Management Flashcards

1
Q

Risk Management Process

A
  • Risk identification
  • Risk Assessment (score, weigh, prioritise risks)
  • Risk Response Planning (determine risk response, plan actions)
  • Response Implementation (continuous risk monitoring)
  • Monitor and Assess results (continuous risk monitoring and response evaluation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T-V pair

A

Threat Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk avoidance

A
  • Stop performing the activities that create risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk reduction

A

Decrease the risk by taking measures to reduce vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk sharing

A

Shift some of the risk to other parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk retention

A

Accept the risk and its consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability Management

A

a security practice that is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerability Management Life Cycle

A
  • Discover
  • Prioritise Assets
  • Assess
  • Report
  • Remediate
  • Verify
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Discover

A

Inventory all assets across the network and identify host details, including operating systems and open services, to identify vulnerabilities. Develop a network baseline. Identify security vulnerabilities on a regular automated schedule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prioritise Assets

A

Categorize assets into groups or business units, and assign a business value to asset groups based on their criticality to business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assess

A

Determine a baseline risk profile to eliminate risks based on asset criticality, vulnerability, threats, and asset classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Report

A

Measure the level of business risk associated with your assets according to your security policies. Document a security plan, monitor suspicious activity, and describe known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Remediate

A

Prioritize according to business risk and address vulnerabilities in order of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Verify

A

Verify that threats have been eliminated through follow-up audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asset management

A

Asset management involves the implementation of systems that track the location and configuration of networked devices and software across an enterprise. As part of any security management plan, organizations must know what equipment accesses the network, where that equipment is within the enterprise and logically on the network, and what software and data those systems store or can access. Asset management not only tracks corporate assets and other authorized devices, but also can be used to identify devices that are not authorized on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MDM

A

Mobile Device Management (MDM) tackles unique challenges in asset management, especially with the rise of Bring Your Own Device (BYOD). Since mobile devices aren’t physically within an organization’s control, they’re susceptible to loss, theft, and tampering, endangering data and network access. MDM involves strategies for responding when devices are no longer under responsible parties’ supervision. Actions may encompass deactivating lost devices, encrypting device data, and bolstering access security through stronger authentication.

17
Q

Configuration management

A

Configuration management addresses the inventory and control of hardware and software configurations of systems. Secure device configurations reduce security risk

18
Q

Patch Management

A

Enterprise Patch Management involves handling software vulnerabilities in operating systems, firmware, and applications. It covers identifying, acquiring, distributing, installing, and verifying patches to mitigate vulnerabilities, including those in critical systems and frameworks. This practice is essential for security and compliance with regulations like SOX and HIPAA. Patches are crucial for addressing vulnerabilities effectively and are mandated in some cases. Asset management data is used to identify systems needing patches. Tools like SolarWinds, LANDesk, and Microsoft SCCM automate patch distribution in large networks.

19
Q

Patch Management techniques

A
  • Agent-based
  • Agentless Scanning
  • Passive Network Monitoring
20
Q

Agent-based

A

This requires a software agent to be running on each host to be patched. The agent reports whether vulnerable software is installed on the host. The agent communicates with the patch management server, determines if patches exist that require installation, and installs the patches. The agent runs with sufficient privileges to allow it to install the patches. Agent-based approaches are the preferred means of patching mobile devices.

21
Q

Agentless scanning

A

Patch management servers scan the network for devices that require patching. The server determines which patches are required and installs those patches on the clients. Only devices that are on scanned network segments can be patched in this way. This can be a problem for mobile devices.

22
Q

Passive Network monitoring

A

Devices requiring patching are identified through the monitoring of traffic on the network. This approach is only effective for software that includes version information in its network traffic.