Security Operations Flashcards
(22 cards)
What are the three phases of a secure baseline?
- Establish
- Deployable
- Maintain
What is the CIS?
Center for internet security. It pros and organizations worldwide provide detailed road maps to set up security baselines.
What is the STIG?
Security technical implementation guide. Security baselines set up by the dod..
What is SCAP? What does it do.
Security context automation protocol.
Provides a common language for vulnerabilities so they can be shared between security tools and systems
What is CIS-Cat?
Center for internet security config assessment tool. Gold standard automatic standard.
How to harden mobile devices?
- Strong passwords
- Biometrics
- Encryption
- Patching.
How to harden workstations?
- Firewalls
- Anti-virus
- Principal of least privilege
How to harden switches?
- Replace defaults
- Strong passwords
- Close unused ports
- Use virtual lans
- Use secure shell
- Use acls
- Patch
How to harden routers?
- Update defaults
- Firewall
- Disable remote management
- Only user ssh for access
- Patches
How to harden cloud?
- Access controls
- Encryption
How to harden servers?
- Patches
- Principal of least privilege
- Logs
How to harden industrial control systems (ICS)?
- Segmentation
- Use supervising control and data acquisition system (SCADA)
- Physical security
- Patches
How to harden IOT’s?
- Change defaults
- Strong authentication
- Updates
- Segmentation
How to harden WAN’s?
- Change default
- Modify ssid name
- Disable ssid broadcasting
- Use MAC filtering
- Use WPA3 encryption
What are the 3 mdm deployment models?
- Bring your own (BYOO)
- Choose your own device (CYOO)
- Corporate owned, personally enabled (COPE)
2 wireless connection methods?
- Wireless
- Bluetooth
What are the 5 Wireless connection methods?
- Ad-hoc- 2 devices connected together without a wan. Like wi-fi direct
- Captive portal- controls access to a wan. Usually a web page.
- Wps- connect to wan by pushing a button. Wi-fi protected setup
- Pre-shared key
- Evil twin attack
What is bluejacking?
Uses Bluetooth discoverable mode to send stuff to phone like phishing
What is bluesnarfing?
Using Bluetooth t o get data from a phone.
How to harden Bluetooth?
- Disable unused connections
- Use Bluetooth low energy (BLE)
- Keep in non discoverable mode
What is nfc? And how to avoid skimmimg
Near field communications. Like contact less pay.
Put in aluminum