3.2 Implement Host or Application Security Solutions Flashcards
A method of enpoint threat protection that scales to meet the increasing number of threats these days.
Endpoint detection and response (EDR)
What are the 3 steps to EDR?
Detect a threat
Investigate the threat
Respond to the threat
Endpoint protection method that involves stopping the leakage of data before the attacker can get to it.
Data loss prevention (DLP)
A firewall capable of broad security controls that include allowing or blocking application features, identifing malware, examining encrypted data, and preventing access to URLs or URL categories.
Next-generation firewall (NGFW)
Software based firewall that runs directly on the endpoint. Can allow or disallow application traffic.
host-based firewall
What is the difference between a HIDS and a HIPS system?
HIDS - Host-based intrusion detection system
Used to detect intrusions
HIPS - Host-based intrusion prevention system
Used to block known attacks
What are the two integrated hardware compnents that are the source of trust for a system when it comes to security?
Trusted platform module (TPM)
Hardware security module (HSM)
Boot type that is part of the UEFI specification and verifies the bootloader on a system.
Secure boot
Boot version that verifies the digital signature of the OS kernel, and takes place just before loading the drivers.
Trusted Boot
What is it called when a devices sends an encrypted and digitally signed report of the system’s secure boot information to an attestation server?
Remote attestation
What are 3 of the main compliance standards that often apply to database security?
PCI DSS
HIPAA
GDPR
The process of replacing sensitive information with a non-sensitive placeholder.
Tokenization
True or false: In tokenization, the original data and the token are mathematically related, just like an encryption.
False
Process of developing code which verifies that the data entered is correctly formatted to prevent attacks.
Input validation
The process of sending random input data to an application in order to test it’s robustness and input validation.
Dynamic analysis (fuzzing)