3.2 Implement host or application security solutions Flashcards
Endpoint protection
-Antivirus
Endpoint protection
-Anti-malware
Endpoint protection
-Endpoint detection and response (EDR)
Endpoint protection
-DLP
Endpoint protection
-Next-generation firewall (NGFW)
Endpoint protection
-Host-based intrusion prevention system (HIPS)
Endpoint protection
-Host-based intrusion detection system (HIDS)
Endpoint protection
-Host-based firewall
Boot integrity
-Boot security/Unified Extensible Firmware Interface (UEFI)
Boot integrity
-Measured boot
Boot integrity
-Boot attestation
Database
-Tokenization
Database
-Salting
Database
-Hashing
Application security
-Input validations
Application security
-Secure validations
Application security
-Hypertext Transfer Protocol (HTTP) headers
Application security
-Code signing
Application security
-Allow list
Application security
-Block list/deny list
Application security
-Secure coding practices
Application security
-Static code analysis
-Manual code review
Application security
-Dynamic code analysis
Application security
-Fuzzing
Hardening
-Open ports and services
Hardening
-Registry
Hardening
-Disk encryption
Hardening
-OS
Hardening
-Patch management
-Third-party
Hardening
-Patch management
-Auto-update
Self-encryption drive (SDE)/full-disk encryption (FDE)
-Opal
Hardware root of trust
Trusted Platform Module (TPM)