3.2 Flashcards
Endpoint Protection
It is the concept of extending security perimeters to the devices that are connecting to the network. Endpoint protection solutions include HIDS/HIPS, firewalls, antivirus, DLP solutions, etc.
Antivirus
Antivirus attempts to identify, neutralize, or remove malicious programs, macros, and files. Signature-based looks for known signatures of malware. Heuristic-based searches for suspicious behavior from programs that allude to malware.
Anti-Malware
It is a product that is designed to protect your machine from malicious software or malware.
Endpoint Detection and Response (EDR)
EDR combines individual endpoint security functions into a complete package. It can include antivirus, anti-malware, software patching, firewall, and DLP solutions.
Data loss prevention (DLP)
DLP serves to prevent data from leaving a network unnoticed. DLP monitoring will take whatever file activity and send the reports to a centralized system.
Next-Generation Firewall (NGFW)
NGFW will actually analyze the content of the traffic that is coming through and not just the source and destination IPs or ports. The challenge is to make sure the rulesets are up-to-date and able to catch the anomalous traffic coming in.
Host-based Intrusion Detection System (HIDS)
HIDS will detect undesired elements that are affecting the hosts endpoints that it is assigned to. It tailors it’s detection to the host OS.
Host-based Intrusion Prevention System (HIPS)
A HIPS is able to act like a HIDS but is capable of acting on it and respond automatically to a threat condition. It detects and prevents.
Host-based Firewall
These are software-based firewalls that monitor and control traffic passing and and out of a single system.
Linux has IPTables, TCP Wrapper, IPChains
Windows has Windows Defender Firewall
Boot Integrity
Process of a system powering up and loading and running the correct hardware/firmware/software needed in compliance with the expected state.
Boot Security/Unified Extensible Firmware Interface (UEFI)
UEFI offers Secure Boot, which only will boot signed drivers and OS loaders. It also uses attestation to ensure that these drivers and loaders haven’t been changed since approved to use.
Measured Boot
Measured boot depends on the Root of Trust in starting the system, but uses hashes of the processes running to compare to known-good hashes. This is good because signatures are harder to come by.
Boot Attestation
Boot attestation reports the state of a system between components and Root of Trust through digital signatures.
Database
Databases can have encryption that protects against any database compromise while performance hits are negligible.
Tokenization
Tokenization is substituting a value instead of the actual sensitive data to guard against disclosing that data. It is a referential integrity option.
Salting
Salting is adding a random value to the end of a password before performing hashing. This will change the outcome hash even if two users have identical passwords.