Various Concepts Flashcards
(124 cards)
software based client that monitors data in use on a computer and can stop file transfers or alert admins of the transfers base on a set of rules or policies.
Endpoint dlp
software or hardware solution installed on the perimeter of the network to protect data in transit.
Network dlp
software stored on servers in a data center to protect data at rest.
Storage dlp
Software to protect data being stored in cloud services, usually a SaaS solution.
Cloud dlp
UEBA
User and Entity Behavior Analytics
SCCM
System Center Configuration Management - Microsoft software management system for admin device management.
trusted program to ensure that microprocessors in the supply chain are secure and is overseen by the Department of Defense
Trusted Foundry Program
process of ensuring that hardware is procured tamper free from a trusted supplier.
Hardware Source Authenticity
cryptographic module embedded within a computer system that can endorse trusted execution and can attest to boot settings and metrics
Root of Trust - ROT
PUF
Physically Unclonable Function - anti tamper mechanism used inside systems (ROT policies).
UEFI feature that prevents unwanted process from executing during the boot process.
Secure Boot
UEFI feature that gathers secure metrics to validate the boot processes in an attestation report.
Measured Boot
A claim that the data presented is valid by digitally signing it using a TPM’s private key.
Attestation
A means for software or firmware to permanently alter the state of a transistor on a computer chip.
eFuse
an update digitally signed by the vendor.
Trusted Firmware Update
low-level CPU changes and instructions that ensure secure processing and are built into the microprocessor.
Processor Security Extensions
AMD chip PSEs
- SME Secure Memory Encryption
- SEV Secure Encrypted Virtualization
Intel chip PSEs
- TXT Trusted Execution Technology
- SGX Software Guard Extensions
extensions that allow a trusted process to create an encrypted container for sensitive data.
Secure Enclave
operations that should only be performed once or not at all.
Atomic Execution
key signature of a directory traversal attack
../../ or dot dot slash and %255
key signature of a SQL attack
’ or 1 = 1
occurs when an attacker is able to execute run commands physically on a victim computer
Arbitrary Code Execution
occurs when an attacker is able to execute run commands on a victim computer remotely
RCE Remote Code Execution