Securing Hosts And Data Flashcards
(43 cards)
Principle that states systems should be deployed with only the application, services, and protocols they need to meet their purpose
Least Functionality
A type of OS that disappears when users turn off the computer
Non-persistent operating system
A type of OS that meets predetermined requirements with a heavy emphasis on authentication and authorization
Trusted Operating System
The two important benefits that imaging provides
- Secure Starting Point
- Reduced Costs
These two strategies include automation, scripting, and templates to help deploy systems securely, and keep them in a secure state
Resiliency and automation strategies
The three steps in baseline configuration
- Initial baseline configuration
- Integrity measurements for baseline deviation
- Remediation
This ensures that systems and applications stay up to date with current updates
Patch Management. Usually combined with NAC technologies to identified unpatched devices.
The process used to control changes and modifications done on systems and applications.
Change Management
Process used to protect hosts to include mobile devices, workstations, and servers from unauthorized applications
Whitelisting & Blacklisting
This technique refers to using an isolated area on a system to test software.
Sandboxing
Linux - chroot command or chroot jail
The secure staging environments used to create software
Development
Test
Staging
Production
These are associated with embedded systems and often have internal storage that might retain documents that they process.
Multi-Function Devices (MFD)
The difference between EMI and EMP
EMI - Electronic Magnetic Interference. Associated with powerlines, microwaves, motors
EMP - Electronic Magnetic Pulse. Associated with Military tech, ESD, and lightning
The difference between FDE and SED
Full Disk Encryption - Encrypts entire disk
Self Encrypting Device - Includes hardware and software to provide encryption to a drive.
The difference between BIOS and UEFI
BIOS - referred as firmware.
UEFI - Does the same as BIOS but it can boot from larger disk and its CPU-independent.
This is a hardware chip on the computer’s motherboard that stores cryptographic keys used for encryption.
TPM - Trusted Platform Module. Supports Secure Boot & Attestation. Provides a hardware root of trust or known secure starting point
This is similar to a TPM but it is added to a system to manage and securely store cryptographic keys
HSM - Hardware Security Module
The three most common type of cloud based technologies used
SAAS - Software as a Service. Web services
PAAS - Platform as a Service - Software is managed by the CSP.
IAAS - Infrastructure as a Service - Software is managed by the customer.
Which Cloud model leaves the majority of the security responsibility to the customer
IAAS
Which Cloud model leaves the least amount of security responsibility to the customer
SAAS
This cloud service provides security services and considered a subset of the software as a Service model
Security as a Service
This is a software tool or service deployed between an organization’s network and the cloud provider to monitory traffic and enforce security policies.
CASP - Cloud Access Security Broker
The four categories of cloud deployment models
Public
Private
Community
Hybrid
The 5 common deployment models for mobile devices
Corporate owned COPE - Corporate owned, personally enabled BYOD - Bring Your Own Device CYOD - Choose Your Own Device VDI - Virtual Desktop Interface