2.2 - Explain logical security concepts Flashcards

1
Q

Active directory

A

AD Itself is a domain controller, there are two types of domains, Local accounts and Domain accounts.

It is used to manage users and groups and computer accounts in a windows domain, has different policies like security, password etc.

Users must authenticate on the network to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where are AD Local Accounts stored?

A

They are stored in the Local Security Accounts database known as the Security Account Manager (SAM) HKEY_LOCAL_MACHINE

in the Windows registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

• Active Directory

A

Active Directory • (provides the basis of authentication for users and computers.) Centralized management

• Windows Domain Services • Limits and control access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AD- Login script

A

Login script • Map network drives • Update security software signatures • Update application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD- Domain

A

Active Directory • Centralized management • Windows Domain Services • Limit and control access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AD- Group Policy/Updates

A

• Group Policy/Updates • Define specific policies • Password complexity • Login restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AD- Organizational Units

A
  • Organizational Units
  • Structure Active Directory
  • Can be based on the company (locations, departments)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AD- Home Folder

A

• Home Folder • Assign a network share as the user’s home • \server1\users\professormesser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AD- Folder redirection

A
  • Folder redirection • Instead of a local folder, redirect to the server • Store the Documents folder on \server1 \my documents
  • Access files from anywhere
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

• Software tokens

A

A means for assisting authentication, like Single-Sign On (SSO). When used correctly AND securely, it allows the token to act as the user instead of the user authenticating multiple times.

When abused or taken advantage of, Software Tokens can be used for “replay attacks”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

• MDM policies for Mobile Device Management (MDM)

A
  • Set policies on apps, data, camera, etc. • Control the remote device
  • The entire device or a “partition”
  • Manage access control
  • Force screen locks and PINs on these single user devices

Used to Manage company-owned and user-owned devices

• BYOD - Bring Your Own Device • Centralized management of the mobile devices • Specialized functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

• Port security

A

Port security • Prevent unauthorized users from connecting to a switch interface

  • Alert or disable the port • Based on the source MAC address
  • Even if forwarded from elsewhere • Each port has its own configuration on the switch
  • Unique rules for every port
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• MAC address filtering

A

Media Access Control - The “hardware” address • Limit access through the physical hardware address

  • Keeps the neighbors out • Additional administration with visitors
  • It’s Easy to find the MAC addresses on my network through wireless LAN analysis
  • MAC addresses can be spoofed • Security through obscurity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• Certificates

A

• IEEE 802.1X • Gain access to the network using a certificate • On-device storage or separate physical device

Certificate-based authentication • Smart card • Private key is on the card • PIV (Personal Identity Verification) card

  • US Federal Government smart card • has a photo, and ID Info
  • CAC (Common Access Card) • US Department of Defense smart card • has a photo, and ID Info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

• Antivirus/Anti-malware

A
  • Anti-malware software runs on the computer • Each device manages its own protection, This type of software includes: Routines and signatures to detect and block Trojans Rootkits Ransomware Spyware
  • Large organizations need enterprise management • Track updates, push updates, confirm updates, manage engine updates • Mobility adds to the challenge • Updates must be completed on all devices
  • This becomes a scaling issue
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Host-based firewalls

A

Host-based firewalls • “Personal” firewalls • Software-based • Windows Defender is an example = comes with Windows Operating Systems

  • 3rd-party solutions also available • Stops unauthorized network access
  • “Statefull” firewall • Blocks traffic by application • Windows Firewall • Filters traffic by port number and application
17
Q

Network-based firewalls

A

Network-based firewalls • Filters traffic by port number • HTTP is 80, SSH is 22 • Next-generation firewalls can identify the application

  • Can encrypt traffic into/out of the network • Protect your traffic between sites
  • Can proxy traffic • A common security technique • Most firewalls can be layer 3 devices (routers) • Usually sits on the ingress/egress of the network
18
Q

Strong passwords

A

Strong passwords • Weak passwords can be difficult to protect against • Interactive brute force • Hashed passwords can be brute forced offline

  • Passwords need complexity and constant refresh • Reduce the chance of a brute force
  • Reduce the scope if a password is found • Annual password analysis from SplashData
19
Q

• User authentication/strong passwords

A

User authentication • Identifier • Something unique • In Windows, every account has a Security Identifier (SID)

  • Credentials • The information used to authenticate the user • Password, smart card, PIN code, etc.
  • Profile • Information stored about the user • Name, contact information, group memberships, etc.
20
Q

• Multifactor authentication

A

• COMBINES More than one factor • Can be expensive • Separate hardware tokens • Can be inexpensive • May be a Free smartphone applications • OR a Software-based token generator

  • Something you are
  • Something you have
  • Something you know
  • Somewhere you are
  • Something you do
21
Q

• Directory permissions

A
  • NTFS permissions
  • Much more granular than FAT
  • Lock down access
  • Prevent accidental modification or deletion
  • Some information shouldn’t be seen
  • User permissions • Everyone IS NOT AN Administrator

• Assign proper rights and permissions • This may be an involved audit

22
Q

• VPN concentrator

A

Virtual Private Network • Encrypt (private) data traversing a public network • Concentrator • Encryption/decryption access device • Many deployment options • Specialized cryptographic hardware • Software-based options available • Used with client software - Sometimes built into the OS

23
Q

• Data Loss Prevention (DLP)

A
  • Where’s your data? • Social Security numbers, credit card numbers, medical records • Stop the data before the bad guys get it • Data “leakage”
  • So many sources, so many destinations • Often requires multiple solutions in different places
24
Q
  • Access Control Lists (ACLs)

* Used to allow or deny traffic

A
  • Also used for NAT, QoS, etc. • IS Defined on the ingress or egress of an interface • Often on a router or switch
  • Incoming or outgoing • ACLs evaluate on certain criteria • Source IP, Destination IP, • TCP port numbers, UDP port numbers, ICMP
  • Deny or permit • What happens when an ACL matches the traffic? • Following the traffic flow
25
Q

• Smart card

A

Smart cards • Must have physical card to provide digital access • A digital certificate • Multiple factors • Card with PIN or fingerprint

26
Q

• Email filtering

A

Email filtering • Unsolicited email • Stop it at the gateway before it reaches the user

  • On-site or cloud-based • Scan and block malicious software
  • Executables, known vulnerabilities • Phishing attempts • Other unwanted content
27
Q

• Trusted/Un-trusted software sources

A
  • Always Consider the source • I not have access to the code • We may not have the time to audit
  • Trusted sources = Internal applications • Well-known publishers • Digitally-signed applications •

Un-trusted sources = Applications from third-party sites • Links from an email • Pop-up/drive-by downloads

28
Q

• Principle of least privilege

A

Least privilege • Rights and permissions should be set to the bare minimum • You only get exactly what’s needed to complete your objective • All user accounts must be limited

  • Applications should run with minimal privileges • Don’t allow users to run with administrative privileges
  • Limits the scope of malicious behavior
29
Q

What is logical security?

A

Logical security refers to the idea that any information or data that is created, stored, and transmitted in digital form is secured to the desired level.

This concept applies to many components of the digital world, such as the Internet, cloud-based computing, networks, mobile devices, tablets, laptops, and standard desktop computers.