3.2 Given a scenario, implement host or application security solutions Flashcards
Endpoint Protection
It refers to the system for network security management that focuses on network endpoints, or individual devices such as workstations and mobile devices from which the network is accessed.
Antivirus
Look for exam questions specifically addressing the output from antivirus software. Just substitute anti-malware software and you’ll see the obvious answer.
Anti-malware
It wasn’t uncommon for a single anti-malware tool to possess five or six different scanning types.
Endpoint Detection and Response(EDR)
Very sophisticated systems called endpoint detection and response (EDR) essentially combine an NGFW with a NIPS on steroids to provide end-to-end monitoring, analysis, response to threat, and forensics for additional research. Full EDR systems have rolled out since 2017 and will undoubtedly gain market share, at least at the high-end enterprise level.
DLP
Most DLP solutions are designed not only to keep your data’s integrity at 100 percent but also to do several other jobs. Some DLP packages verify backups exist and are in good order. Some DLP packages monitor if data is being moved or copied
Next-generated firewall(NGFW)
A next-generation firewall (NGFW) functions at multiple layers of the OSI model to tackle traffic no traditional firewall can filter alone. A Layer 3 firewall can filter packets based on IP addresses, for example. A Layer 5 firewall can filter based on port numbers. Layer 7 firewalls understand different application protocols and can filter on the contents of the application data. An NGFW handles all of this and more.
Host-based intrusion system(HIPS)
A host-based intrusion prevention system (HIPS) actively scans incoming packets and blocks potentially harmful ones aggressively.
Host-based intrusion detection system(HIDS)
A host-based intrusion detection system (HIDS) serves to detect patterns of malicious traffic, such as those that may target certain protocols or services that appear to cause excessive amounts of traffic, or other types of intrusion.
Host-based firewall
A host-based firewall, like the excellent Windows Defender Firewall, blocks unwanted access based on port numbers and other criteria.
Boot Integrity
Modern personal computers rely on Unified Extensible Firmware Interface (UEFI) for firmware, as you’ll recall from your CompTIA A+ studies. Look for a question on the CompTIA Security+ exam that points to boot security/Unified Extensible Firmware Interface (UEFI) as the preferred method for assuring boot integrity.
Boot Security/Unified Extensible Firmware Interface (UEFI)
Modern personal computers rely on Unified Extensible Firmware Interface (UEFI) for firmware, as you’ll recall from your CompTIA A+ studies. Look for a question on the CompTIA Security+ exam that points to boot security/Unified Extensible Firmware Interface (UEFI) as the preferred method for assuring boot integrity.
Measured boot
With Windows 10, Microsoft added another tool called Measured Boot that interacts with UEFI and TPM over a network to verify the integrity of the boot files. This architecture blocks malware such as rootkits.
Boot Attestation
During the boot process, the TPM and UEFI generate reports about the process and can send those reports to a remote system, like a central authentication server. This process is called boot attestation.
Tokenization
It’s up to the developers to determine which fields in which database tables need to be tokenized. They must also make sure that the tokenization isn’t broken in other indexed tables the database may use.
Salting
If your database stores passwords, odds are good you will store the password’s hash value. But rainbow tables are powerful attack tools, so you’ll need to introduce some sort of salting mechanism to the plaintext password before you hash it. It’s the developer’s job to make this determination and to ensure the salting mechanism isn’t in any way visible to an attacker.
Hashing
IT security professionals use hashes with databases in two ways. First, they hash a static database (one that isn’t being updated) to ensure that it hasn’t been altered. Second, they use hashing to find a data record without relying on indexing, something you’ll see employed in very large databases.