11 Endpoint Security Flashcards

1
Q

What is the importance of using appropriate cryptographic solutions?

A

Ensures data confidentiality, integrity, and authenticity.

Tools include Trusted Platform Module (TPM), Hardware Security Module (HSM), Key Management System, and Secure Enclave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the types of vulnerabilities?

A

Operating system (OS)-based, Hardware (Firmware, End-of-life, Legacy), Misconfiguration.

Each type presents different risks that need to be managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of mitigation techniques in securing the enterprise?

A

To reduce risk and enhance security through strategies such as patching, encryption, and configuration enforcement.

Other techniques include decommissioning and hardening techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List some hardening techniques.

A
  • Encryption
  • Installation of endpoint protection
  • Host-based firewall
  • Host-based intrusion prevention system (HIPS)
  • Disabling ports/protocols
  • Default password changes
  • Removal of unnecessary software

Hardening techniques are critical for securing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the security implications of different architecture models?

A

Architecture models can affect the security posture of IoT, Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), Real-time Operating Systems (RTOS), and Embedded Systems.

Understanding these implications is crucial for security planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are secure baselines?

A

Establish, Deploy, Maintain.

Secure baselines help ensure consistent security configurations across systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does proper hardware, software, and data asset management entail?

A
  • Acquisition/procurement process
  • Assignment/accounting (Ownership, Classification)
  • Monitoring/asset tracking (Inventory, Enumeration)
  • Disposal/decommissioning (Sanitization, Destruction, Certification, Data retention)

Effective asset management is key to maintaining security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What tools are used for security alerting and monitoring?

A
  • Antivirus
  • Data Loss Prevention (DLP)

These tools help detect and respond to security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is endpoint detection and response (EDR)?

A

A security solution for detecting, investigating, and responding to endpoint threats.

EDR is part of enhancing overall security capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Endpoints significantly outnumber servers and network devices in most organizations.

A

True

This makes endpoint protection a major task for security professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some techniques to secure a system’s boot process?

A

Secure boot, firmware validation, and integrity checks.

These techniques help prevent unauthorized access at startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: _______ involves the practices of detecting, preventing, and remediating malware infections.

A

Antimalware and antivirus tools

These tools are essential for maintaining system integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What specialized systems are discussed in relation to security requirements?

A

Embedded systems, Real-time Operating Systems (RTOS), SCADA, and Industrial Control Systems (ICS).

They have different security needs compared to traditional systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of asset inventories in organizational security?

A

To track and manage assets effectively, ensuring accountability and security compliance.

Asset inventories are critical for security operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a key element in security operations related to operating systems?

A

Properly securing operating systems

This includes workstations, mobile devices, servers, and other types of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can be exploited by attackers in operating systems?

A

Vulnerabilities in the operating system itself

This drives the need for ongoing patching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is meant by minimizing an operating system’s attack footprint?

A

Reducing the number of exposed services that can be targeted

This involves configuring systems appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are potential paths for attackers in operating systems?

A

Defaults like default passwords and insecure settings

Insecure defaults can lead to vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are configuration baselines?

A

Security practices intended to avoid insecure defaults

They help ensure that systems are set up securely from the start.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the difference between configurations and defaults?

A

Configurations are intentional but may be insecure, while defaults are pre-set values

Both can lead to vulnerabilities if not managed properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of security tools can help limit configuration issues?

A

Tools that support mandatory access control

These tools help mitigate potential vulnerabilities introduced by configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is misconfiguration?

A

A mistake made in system configuration

It is a common way for attackers to exploit systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What remains a consistent way for attackers to overcome security measures?

A

Human error

Misconfiguration often results from mistakes made by individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does the Security+ exam outline say about operating system-based vulnerabilities?

A

It is vague and just lists ‘OS-based’

This requires deeper understanding during study.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What factors impact an organization’s security regarding operating systems?

A

Choice of operating system, its defaults, security configuration, and support model

Each of these elements plays a crucial role in overall security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are hardware vulnerabilities?

A

Hardware vulnerabilities are weaknesses in hardware components that can be exploited, affecting security designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are compensating controls?

A

Compensating controls are alternative security measures implemented to mitigate the impact of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What types of vulnerabilities should test takers explain according to the Security+ exam outline?

A

Hardware vulnerabilities related to firmware, end-of-life hardware, and legacy hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is firmware?

A

Firmware is the embedded software that allows devices to function, closely tied to hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Can firmware be updated?

A

Firmware can often be updated but may require manual updates depending on device design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are some paths through which firmware attacks may occur?

A
  • Executable updates
  • User downloads of malicious firmware
  • Remote network-enabled updates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Why are firmware vulnerabilities particularly concerning?

A

Malicious firmware persists even after reinstalling the operating system or other software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is an example of a firmware attack?

A

2022’s MoonBounce malware targets a computer’s Serial Peripheral Interface (SPI) flash memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the significance of firmware validation?

A

Firmware validation is crucial for security practitioners to ensure the integrity of device firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does ‘end-of-life’ hardware indicate?

A

End-of-life hardware is no longer sold but may still receive support for a limited time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is meant by ‘end of support’?

A

End of support is the last date on which the vendor provides support or updates for a product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define ‘end of sales’.

A

End of sales is the last date a specific model or device will be sold, though it may still be available through resellers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What does the term ‘legacy’ refer to?

A

Legacy describes hardware, software, or devices that are no longer supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Fill in the blank: Firmware attacks may occur through _______.

A

[any path that allows access to the firmware]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

True or False: Firmware attacks can be removed by reinstalling the operating system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a critical security control mentioned for firmware protection?

A

Trusted boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is meant by the term ‘endpoints’ in a network?

A

Endpoints refer to devices like desktops, mobile devices, and servers that are the endpoints of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the two techniques modern UEFI firmware uses to ensure boot integrity?

A
  • Secure Boot
  • Measured Boot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the purpose of Secure Boot?

A

Secure Boot ensures that the system boots using only software that the original equipment manufacturer (OEM) trusts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does Measured Boot do?

A

Measured Boot measures each component of the boot process and relies on UEFI firmware to hash firmware, bootloader, and drivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the role of the Trusted Platform Module (TPM) in boot integrity?

A

TPM stores the data gathered from the boot process and allows validation of the boot state remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are the three major functions of TPM chips?

A
  • Remote attestation
  • Binding
  • Sealing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are hardware security modules (HSMs) used for?

A

HSMs are used to create, store, and manage digital keys for cryptographic functions and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is a key management service (KMS)?

A

KMS is a service used to manage cryptographic keys and secrets centrally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What methods do antimalware tools use to detect malware?

A
  • Signature-based detection
  • Heuristic-based detection
  • AI and machine learning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is sandboxing in the context of antimalware tools?

A

Sandboxing is an isolated environment where potentially dangerous software can be run to observe its actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

True or False: Allow lists are more secure than deny lists.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the main function of Endpoint Detection and Response (EDR) tools?

A

EDR tools monitor endpoint devices and systems to collect, correlate, and analyze events for suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What distinguishes Extended Detection and Response (XDR) from EDR?

A

XDR takes a broader perspective, considering the entire technology stack of an organization, not just endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What are key elements of Data Loss Prevention (DLP) systems?

A
  • Data classification
  • Data labeling/tagging
  • Policy management and enforcement
  • Monitoring and reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Fill in the blank: A _______ is a list of software that is allowed to run on a system.

A

[allow list]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the primary purpose of host-based firewalls?

A

Host-based firewalls protect endpoints from unwanted network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What challenge do organizations face when maintaining allow lists and deny lists?

A

The effort required to maintain the lists is a significant challenge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the function of the hardware root of trust?

A

The hardware root of trust contains cryptographic keys that secure the boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

List two examples of secure elements similar to TPM.

A
  • Apple’s Secure Enclave
  • Google’s Titan M
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is the primary goal of DLP systems?

A

To protect organizational data from theft and inadvertent exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is the significance of policy management in DLP systems?

A

Policy management ensures that data handling meets organizational standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

True or False: EDR tools do not provide capabilities for manual investigation.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What feature of EDR systems helps in detecting suspicious data?

A

The ability to search and explore collected data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What does EDR stand for?

A

Endpoint Detection and Response

EDR is a security solution that helps organizations detect and respond to threats on endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is the purpose of XDR?

A

Extended Detection and Response

XDR integrates multiple security products into a cohesive system for improved threat detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What significant threats have led to the adoption of EDR and XDR?

A

Ransomware and other malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What does DLP stand for?

A

Data Loss Prevention

DLP tools are used to ensure sensitive data does not leave the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is a host-based firewall?

A

A firewall built into most modern operating systems that stops unwanted traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

How do host-based firewalls typically operate?

A

They block or allow specific applications, services, ports, or protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is the function of a host intrusion prevention system (HIPS)?

A

Analyzes traffic before services or applications process it and can take action on that traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What can a HIPS do with malicious traffic?

A

Filter out malicious traffic or block specific elements of the data received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What problem can occur if a HIPS misidentifies legitimate traffic?

A

It can block legitimate traffic, potentially causing an outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What incident occurred when a HIPS was deployed in a datacenter?

A

The HIPS blocked backend traffic due to unrecognized protocol changes from a Windows update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is the main difference between a host-based intrusion detection system (HIDS) and a HIPS?

A

A HIDS can only report and alert on issues, while a HIPS can take action to block traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is a key consideration before deploying HIPS or HIDS?

A

How to manage them and what would happen if problems occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What role do granular controls play in security?

A

They are an important part of a zero-trust design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What can prevent network security devices from seeing traffic?

A

Network switches that allow traffic to move from system to system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is a potential issue with using a HIDS in real-time security?

A

It has a limited use for real-time security due to its inability to block traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Fill in the blank: A HIPS can analyze traffic _______ services or applications process it.

A

before

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is hardening in the context of systems and applications?

A

Changing settings on the system to increase overall security and reduce vulnerability to attack.

The concept of a system’s attack surface is important when performing system hardening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What are common organizations that provide hardening guides?

A
  • Center for Internet Security (CIS)
  • National Institute of Standards and Technology (NIST)

Guides are available for operating systems, browsers, and various other hardening targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What are key hardening items listed in the Security+ exam outline?

A
  • Encryption
  • Installing endpoint protection
  • Host-based firewalls
  • Host-based intrusion prevention systems
  • Disabling ports and protocols
  • Changing default passwords
  • Removing unnecessary software

These are essential concepts to understand for the exam.

84
Q

How can the attack surface of a system be decreased?

A

By reducing the number of open ports and services.

Disabling unnecessary ports and protocols makes it harder for attackers to exploit systems.

85
Q

What is the purpose of port scanners in security?

A

To quickly assess which ports are open on systems on a network.

This allows security practitioners to identify and prioritize hardening targets.

86
Q

What is the rule of thumb for hardening services and ports?

A

Only services and ports that must be available should be open, limited to necessary networks or systems.

This minimizes potential attack vectors.

87
Q

Which port is commonly used for Secure Shell (SSH) in Linux systems?

A

22/TCP.

SSH is more common in Linux than in Windows.

88
Q

Which command in Ubuntu can check which services are running?

A

service –status-all.

This command helps identify services for starting or stopping.

89
Q

What is a common technique used in hardening networks?

A

Using VLANs (virtual local area networks) to segment different trust levels or user groups.

This practice helps protect vulnerable devices and manage network security.

90
Q

Why is changing default passwords important in hardening practices?

A

Default passwords are often documented and publicly available, creating significant risk.

Databases of default passwords can be found online.

91
Q

What is a key practice in hardening efforts regarding software?

A

Removing unnecessary software.

This reduces potential vulnerabilities and the need for patching.

92
Q

What is a challenge with mobile devices in terms of hardening?

A

Vendor-supplied tools can create vulnerabilities.

Mobile device management platforms can help address these issues.

93
Q

Fill in the blank: The best option for unneeded services is to ______ them entirely.

A

disable.

This is preferable to merely blocking them using a firewall.

94
Q

True or False: You need to know OS-specific commands for the Security+ exam.

A

False.

Understanding the concept of disabling services is sufficient.

95
Q

What is the primary purpose of operating system hardening?

A

To reduce the attack surface for your operating system.

96
Q

What benchmarks can be used for hardening operating systems?

A

Center for Internet Security (CIS) benchmarks.

97
Q

What is the recommended password history setting according to CIS benchmarks for Windows?

A

Remember 24 or more passwords.

98
Q

What is the maximum password age recommended by CIS benchmarks?

A

365 or fewer days, but not 0.

99
Q

What is the minimum password length recommended by CIS benchmarks?

A

14 or more characters.

100
Q

What type of encryption should be disabled according to CIS benchmarks?

A

Reversible encryption for password storage.

101
Q

What is the Windows Registry’s role in the operating system?

A

It tracks system activities and configurations.

102
Q

What is one method to harden the Windows Registry?

A

Disallow remote Registry access if not required.

103
Q

What is a Group Policy Object (GPO)?

A

A tool to control settings in Windows systems and domains.

104
Q

What does the Security Compliance Toolkit (SCT) do?

A

Works with security configuration baselines for Windows and other Microsoft applications.

105
Q

What is SELinux?

A

A Linux kernel-based security module providing additional security capabilities.

106
Q

What type of access control does SELinux enforce?

A

Mandatory access control (MAC).

107
Q

What is AppArmor in relation to Linux hardening?

A

Another tool implementing mandatory access controls for Linux.

108
Q

What is the first phase of a baseline’s life cycle in configuration management?

A

Establishing a baseline.

109
Q

What is the importance of patch management?

A

To ensure systems and software are up to date and secure.

110
Q

What is full-disk encryption (FDE)?

A

Encryption that protects the entire disk and requires a decryption key for access.

111
Q

What is a common risk associated with patching systems?

A

Patches may introduce new flaws.

112
Q

What is the common practice regarding patch installation after release?

A

Delay installation for a few days to assess potential issues.

113
Q

What happens if the encryption key for a disk is lost?

A

The data on the drive will likely be unrecoverable.

114
Q

What is the advantage of self-encrypting drives (SED)?

A

Implement encryption capabilities in hardware and firmware.

115
Q

Fill in the blank: The process of managing configurations in an enterprise environment is called _______.

A

Configuration management.

116
Q

True or False: The CIS benchmarks provide a single, unmodifiable standard for all organizations.

117
Q

What is the role of configuration management tools?

A

To enforce standards, manage systems, and report on security settings.

118
Q

What is the impact of disk encryption on lost or stolen systems?

A

It can be treated as a loss of the system rather than a data breach.

119
Q

What is one key feature of enterprise patch management?

A

The ability to force updates to be installed.

120
Q

What is the primary purpose of operating system hardening?

A

To reduce the attack surface for your operating system.

121
Q

What benchmarks can be used for hardening operating systems?

A

Center for Internet Security (CIS) benchmarks.

122
Q

What is the recommended password history setting according to CIS benchmarks for Windows?

A

Remember 24 or more passwords.

123
Q

What is the maximum password age recommended by CIS benchmarks?

A

365 or fewer days, but not 0.

124
Q

What is the minimum password length recommended by CIS benchmarks?

A

14 or more characters.

125
Q

What type of encryption should be disabled according to CIS benchmarks?

A

Reversible encryption for password storage.

126
Q

What is the Windows Registry’s role in the operating system?

A

It tracks system activities and configurations.

127
Q

What is one method to harden the Windows Registry?

A

Disallow remote Registry access if not required.

128
Q

What is a Group Policy Object (GPO)?

A

A tool to control settings in Windows systems and domains.

129
Q

What does the Security Compliance Toolkit (SCT) do?

A

Works with security configuration baselines for Windows and other Microsoft applications.

130
Q

What is SELinux?

A

A Linux kernel-based security module providing additional security capabilities.

131
Q

What type of access control does SELinux enforce?

A

Mandatory access control (MAC).

132
Q

What is AppArmor in relation to Linux hardening?

A

Another tool implementing mandatory access controls for Linux.

133
Q

What is the first phase of a baseline’s life cycle in configuration management?

A

Establishing a baseline.

134
Q

What is the importance of patch management?

A

To ensure systems and software are up to date and secure.

135
Q

What is full-disk encryption (FDE)?

A

Encryption that protects the entire disk and requires a decryption key for access.

136
Q

What is a common risk associated with patching systems?

A

Patches may introduce new flaws.

137
Q

What is the common practice regarding patch installation after release?

A

Delay installation for a few days to assess potential issues.

138
Q

What happens if the encryption key for a disk is lost?

A

The data on the drive will likely be unrecoverable.

139
Q

What is the advantage of self-encrypting drives (SED)?

A

Implement encryption capabilities in hardware and firmware.

140
Q

Fill in the blank: The process of managing configurations in an enterprise environment is called _______.

A

Configuration management.

141
Q

True or False: The CIS benchmarks provide a single, unmodifiable standard for all organizations.

142
Q

What is the role of configuration management tools?

A

To enforce standards, manage systems, and report on security settings.

143
Q

What is the impact of disk encryption on lost or stolen systems?

A

It can be treated as a loss of the system rather than a data breach.

144
Q

What is one key feature of enterprise patch management?

A

The ability to force updates to be installed.

145
Q

What are embedded systems?

A

Computer systems built into other devices, often specialized and with specific functions.

146
Q

What is a real-time operating system (RTOS)?

A

An operating system that processes data as it comes in without waiting for other tasks.

147
Q

What is the primary purpose of assessing embedded systems?

A

To ensure they remain secure and usable without causing malfunctions.

148
Q

List the steps involved in assessing embedded systems.

A
  • Identify the manufacturer and acquire documentation
  • Determine how it interfaces with the world
  • Identify services and secure connections
  • Learn about updates and patching cycles
  • Document response to security issues
149
Q

What types of devices can include embedded systems?

A
  • Medical systems
  • Smart meters
  • Vehicles
  • Drones and autonomous vehicles
  • VoIP systems
  • Printers
  • Surveillance systems
150
Q

What does SCADA stand for?

A

Supervisory Control and Data Acquisition

151
Q

What are the components commonly found in SCADA systems?

A
  • Remote telemetry units (RTUs)
  • Programmable logic controllers (PLCs)
  • System control and monitoring interfaces
152
Q

True or False: SCADA systems are designed with security as a primary consideration.

153
Q

What are some common security concerns for IoT devices?

A
  • Poor security practices
  • Short support lifespans
  • Vendor data-handling practices
154
Q

Fill in the blank: Many embedded systems operate using _______ connectivity.

A

[cellular]

155
Q

What is a significant risk associated with fitness trackers in sensitive areas?

A

They can reveal GPS data and routes used by personnel.

156
Q

What is the role of the subscriber identity module (SIM) in cellular-enabled devices?

A

It provides identity and connectivity for the device.

157
Q

What are Zigbee and Z-Wave?

A

Network protocols designed for personal area networks and home automation.

158
Q

What are some constraints of embedded systems that impact security?

A
  • Limited computational power
  • Potential lack of network connectivity
  • Low memory and storage capacity
159
Q

What is the risk of using default configurations in specialized systems?

A

They may contain vulnerabilities that can be exploited.

160
Q

What is the importance of documenting findings when assessing embedded systems?

A

To ensure appropriate practices are included in operational procedures.

161
Q

What does the acronym RTU stand for?

A

Remote Terminal Unit, Remote Telemetry Unit, or Remote Telecontrol Unit.

162
Q

What is a critical security measure for vehicles connected to the Internet?

A

Encrypting command-and-control channels.

163
Q

What security challenges do low-power, specialized devices present?

A

They may not receive patches or support and can have long lifespans.

164
Q

What is a common usage for SCADA systems?

A

Monitoring and controlling industrial processes.

165
Q

Fill in the blank: ICS stands for _______.

A

[Industrial Control Systems]

166
Q

What is a potential consequence of a compromised vehicle?

A

Shutting down safety features or taking control of the vehicle.

167
Q

What is a significant concern when securing IoT devices?

A

Weak default settings and lack of network security.

168
Q

How can printers be a security risk in a network?

A

They can act as access points to protected networks and may leak data.

169
Q

What issues may arise due to limited connectivity in embedded systems?

A

Inability to patch, monitor, or maintain devices remotely

Embedded systems are often deployed in areas with limited connectivity, affecting their management.

170
Q

What factors can prevent authentication to an embedded system?

A

Lack of network connectivity, CPU and memory capacity

Authentication may also be undesirable for safety or usability reasons.

171
Q

What types of devices commonly utilize embedded systems?

A
  • Industrial machinery
  • Sensors and monitoring systems
  • Household appliances

These devices often operate without traditional network connectivity.

172
Q

Why might replacing a vulnerable embedded device be challenging?

A

It is often a component in a larger specialized device

This necessitates compensating controls or special design decisions.

173
Q

What does implied trust in embedded devices refer to?

A

Presumption that operators interacting with the device are trusted

Physical access is viewed as authorization to use or modify the device.

174
Q

What security implications arise from the implied trust model in embedded devices?

A

Potential vulnerability for organizations

This model must be reviewed and designed for before deployment.

175
Q

True or False: Embedded systems are always connected to a traditional network.

A

False

Many embedded systems are deployed outside of traditional networks.

176
Q

Fill in the blank: Without authentication, other _______ need to be identified for embedded systems.

A

[security models]

This is crucial to ensure authorized changes to the system.

177
Q

What are the consequences of deploying embedded devices without considering their security?

A

They may become a potential vulnerability for organizations

Security design considerations are essential during deployment.

178
Q

What is the primary purpose of asset management?

A

To ensure the security of assets throughout their life cycle

This includes hardware, software, and data.

179
Q

What should acquisition and procurement processes include?

A

Security best practices and assessment

Ensures appropriate security controls and practices.

180
Q

What is the significance of asset inventories?

A

They help track assets through their lifespan and ensure security

Includes identifying owners and classifying sensitive data.

181
Q

What does enumeration typically involve?

A

Scanning to identify assets

Some organizations use port and vulnerability scans.

182
Q

True or False: Maintaining asset inventories helps organizations understand their assets.

A

True

Lack of inventories can lead to uncontrolled risks.

183
Q

What is decommissioning in asset management?

A

The process of removing a device or system from service and inventory

Ensures no sensitive data remains on the system.

184
Q

What are the two processes for sanitizing drives or media?

A
  • Wiping the data
  • Destroying the media

Both methods are important for secure disposal.

185
Q

How does a degausser work?

A

Exposes magnetic media to strong electromagnetic fields to scramble data

It is used to wipe tapes and similar magnetic media.

186
Q

What is data remanence?

A

Data still present on a disk after an attempted wipe

Particularly concerning with SSDs due to wear-leveling algorithms.

187
Q

What is a recommended method for ensuring data is not recoverable on SSDs?

A

Use full-disk encryption and discard the encryption key

This prevents data recovery even by advanced threats.

188
Q

What is one popular option for organizations wanting to eliminate the risk of data exposure?

A

Destroying drives by shredding, pulverizing, or incinerating

Third-party vendors often provide these services.

189
Q

What is the purpose of certification processes in asset management?

A

To document that assets were decommissioned properly

Certificates of destruction provide proof of disposal.

190
Q

Fill in the blank: If drives aren’t wiped, sensitive data may remain _______.

A

[on the system]

This can lead to significant security incidents.

191
Q

What are common reasons for data retention in organizations?

A
  • Legal purposes
  • Business purposes
  • Compliance or audit components

Retention periods can be determined by law.

192
Q

What should disposal processes be aware of?

A

Retention policies and procedures

Ensures compliance with legal and organizational requirements.

193
Q

What risks can arise from retaining assets longer than necessary?

A
  • Data breaches
  • Increased data availability during legal cases

Proper disposal is critical to mitigate these risks.

197
Q

What is the port number for FTP?

198
Q

What is the port number for SSH?

199
Q

What is the port number for Telnet?

200
Q

What is the port number for HTTP?

201
Q

What is the port number for HTTPS?

202
Q

Which services are considered secure options for remote shell access?

A
  • SSH (Port 22)
  • HTTPS (Port 443)
203
Q

True or False: HTTPS can be used for secure file transfer.

204
Q

Naomi’s best option is to disable which three likely unsecure protocols?

A
  • FTP (port 21)
  • Telnet (port 23)
  • HTTP (port 80)
205
Q

Fill in the blank: Secure mode FTP is also known as _______.

206
Q

What is the primary concern regarding FTP, Telnet, and HTTP?

A

They are likely unsecure protocols.