Security Operations Part I Flashcards
TPM
Trusted Platform Module:
- build into motherboard
- stores encyrption keys locally (some keys)
- supports BitLocker, Secure Boot
- Keys never leave the chip
- not scalabe
- used on 1 device
HSM
Hardware Security Module:
- Used in data centers, clouds
- stores millions of encrypted keys
- scalable
- used in banks, enterprises
UEFI
Unified Extensible Firmware Interface:
+ replacement for BIOS
+ faster boot times
+ supports Secure Boot
+required for BitLocker with Security Boot
Secure Boot
*UEFI feature
*allows only trusted software to run during setup
*verifies drives using digital signatures
* blocks rootkits, bootkits (malware)
* cryptographics keys (PK, KEK< db, dbx)
*works with TPM for Measured Boot & Attestation
Whitelisting✔️
Only approved apps can run ✔️
Blacklisting❌
blocks untrusted apps ❌
Application hardening🤷
removing unnecessary features, code, access so attackers have less things to target. 🤷
Antimalware🦠
Antyvirus 2.0
basic protection, blocks known threats🦠
EDR 🦠
Endpoint Detenction and Response:
Advanced security detects, responds, analizes, even if threat is unknown 🦠
Network segmentation
Isolate critial systems with VLANs, firewalls, DMZs
NAC
Network Access Control
Network gatekeeper :)
= checks device identity and security posture✅
= allows or blocks access✅
Degaussing 💿
data destruction method to wipe magnetic storage (HDDs, tapes) 💿
- does not work on SSDs
Asset inventory 💻🖥️
(what is does?)
Tracks all assets in a company. Hardware & Software, people. 💻🖥️
CMDB 🧑🤝🧑
Configuration Management Database:
Tracks configurations, owners, relatioships between devices, dependencies, change history, etc. 🧑🤝🧑
Assets (?)
Everything valuable to company that needs protection:
- IT devices
- data
- cloud services (VMs)
- people
- certificates, keys
CVSS
Common Vulnerability Scoring System (0 -10)
+ scores how big vulnerability is
+ 9-10 is critical
+ helps prioritize patching
0.1-3.9 - low
4.0-6.9 - medium
7.0-8.9 - high
9.0-10.0 - critical
Remediation
You found the vulnerability now eliminate it :))
Compensate, Mitigation
buy time or limit damage cuz you cant fix the issue directly
penetration test
simulating real world cyberattack (hiring ethical hackers to hack their company)
WAF
Web Application Firewall
Endpoints
user devices connected to the network (laptop, phone, printer)
SIEM 🧠
Security Information and Event Management:
- Central Brain 🧠
- stores, collects, analizes logs from everywhere (firewalls, endpoints, servers)
*sends allerts - “Log centralization” + detection + analysis + alerting
EDR 💻
Can isolate infected devices and roll back damage
Endpoint Detection and Response: 💻
- “Endpoint Bodyguard”
Watches Endponts (laptops, desktops, servers) for malware and sus activity
NDR 🌐
Network Detection and Response: 🌐
@ Network Watchtower
@ Watches the network for threats and lateral movement
@ east-west network traffic surveillance