3.2 Given a scenario, implement host or application security solutions. Flashcards
TPM
The Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system and provides secure key storage for full disk encryption. A TPM keeps hard drives locked until proper authentication occurs.
HSM
A Hardware Security Module (HSM) is a device used to generate, maintain, and store cryptographic keys. It is an external device and can easily be added to a system.
HIDS
A Host-based Intrusion Detection System (HIDS) can detect attacks on a host and protect critical files.
HIPS
Host intrusion prevention systems (HIPS) provide threat detection and prevent those threats based on signature values, heuristic behaviors, and security policies.
EDR
An endpoint detection and response (EDR) product provides real-time and historical visibility into the compromise, contains the malware, and facilitates remediation of the host to its original state.
Measured Boot
A trusted, or measured, boot process uses the trusted platform module (TPM) at each stage in the boot process to check hashes of key system state data, which then uses an attestation process to verify if the system has not been tampered with.
Fuzzing
Fuzzing is a dynamic analysis technique that checks code as it is running. When using fuzzing, the system is attacked with random data to check for code vulnerabilities.
Static analyzer
A static code analyzer examines code quality and effectiveness without executing the code. An analyzer can be used in conjunction with development for continued code quality checks, or once the code is in its finalization stages.
SED
A self-encrypting drive (SED) includes both the hardware and software to encrypt data on a drive. Keys are securely stored within for decryption. SED requires credentials to be entered for decryption.
provides encryption for a whole disk and protects the confidentiality of the data
Full disk encryption (FDE)
radio frequencies emitted by external sources, such as power lines that disturb signals. Can be avoided by shielding
Electromagnetic interference (EMI)
combination of hardware and software used to adjust settings in a computer.
BIOS
UEFI
Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer’s firmware to its operating system. UEFI is the replacement for Basic Input/Output System (BIOS) and has many advancements to include provisions for secure booting.
process of checking and validating system files during a boot process.
Attestation
a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.
hardware root of trust