2) Security Part 3 Flashcards

1
Q

Password Best Practices

A
Strong passwords
Password expiration
Screensaver required password
BIOS/UEFI passwords
Requiring passwords
Change default usernames/passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Account Management

A

Restricting user permissions (least privilege)
Logon time restrictions
Disabling guest account
Failed attempts lockout
Timeout/screen lock
Change default admin user account/password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Basic Active Directory Functions

A

Account creation
Account deletion
Password reset/unlock account
Disable account

Right Click User > Properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disable Autorun

A

Autorun.inf in Vista
Windows 7/8/10 - Not available

AutoPlay - If Windows detects audio files in a removable disk, it will automatically run them.
Can be disabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mobile Device Security: Screen Locks

A

Fingerprint lock
Face lock
Swipe lock
Passcode lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mobile Device Security: Locator Apps/Remote Wipes

A

Build-in GPS (may use 802.11 to triangulate location)
Find your phone on a map
Control from afar (make a sound, display message)
Wipe everything remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mobile Device Security: Remote Backup Apps

A

Can be difficult to backup something that’s always moving.

You can automatically backup data to the cloud (iCloud, Google)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobile Device Security: Failed login attempts restrictions

A

iOS: Erase everything after 10 failed attempts
(Timeout increases for each fail after 5th)

Android: Lock device & require Google login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mobile Device Security: Antivirus/Anti-malware

A

iOS
Closed environment, tightly regulated
Malware has to find a zero-day

Android
More open, apps can be installed from anywhere
Easier for malware to find its way in

Apps run in a “sandbox”
You control what data an app can view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mobile Device Security: Patching/OS updates

A

All devices need updates.
Security patches are very important.
Usually includes new features, bug fixes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mobile Device Security: Full Device Encryption

A

Encrypts all device data (phone keeps the key)

iOS 8+: personal data is encrypted with passcode

Android: Full device encryption can be turned on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile Device Security: Authenticator Apps

A

Pseudo-Random token generator used to confirm identity for multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mobile Device Security: Trusted vs. Untrusted Sources

A

Android:
Once malware is on a phone, it has a huge amount of access.

iOS:
All apps are curated by Apple.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile Device Security: Firewalls

A

Mobile phones don’t include a firewall.
Most traffic is outbound, not inbound.

Some mobile firewalls apps are available.
Most for Android, not widely used.

Enterprise environments can control mobile apps.
Firewalls can allow/disallow access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobile Device Security: Policies/Procedures

A

BYOD (Bring Your Own Device)
Using your own device in a corporate setting.
MDM (Mobile Device Manager)
Allows for centralized management of the devices.
Can set policies on apps/data/camera/locks/etc

Profile security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Destruction: Shredder

A

Industrial shredders can be used to destroy hard drives. Not something that can typically be done at home.

17
Q

Data Destruction: Drill/Hammer

A

Quick and easy means of data destruction in a home setting. Drill the platters all the way through.

18
Q

Data Destruction: Degaussing

A

Destroys the drive data & electronics with electromagnetics to remove the magnetic field.

19
Q

Data Destruction: Incineration

A

Helps to ensure that no part of the drive can be recovered.

20
Q

Data Destruction: Certificate of Destruction

A

A certificate that confirms that all of your data has been completely destroyed by whichever third party you use.
A paper trail of the broken data (you know exactly what happened)

21
Q

Data Destruction: Low-Level vs. Standard Format

A

Low Level:
Provided at a factory (not an end-user process)

Standard Format/Quick Format:
Sets up file system, installs boot sector
Clears master file table, but not data
Can be recovered with proper software

Standard Format/Regular Format:
Overwrites every sector with zeros
Windows Vista & later
Cannot recover data

22
Q

Data Destruction: Overwrite

A

File level overwriting: Sdelete

Windows Sysinternals

23
Q

Data Destruction: Drive Wipe

A

DBAN (Darik’s Boot & Nuke)

Whole drive wipe, secure data removal