3.5 Flashcards
security baseline
the minimum
amount of security controls needed for safeguarding an IT system based on its identified needs for confidentiality, integrity,
and/or availability protection
center for internet security (cis)
The CIS Benchmarks are strict configuration recommendations for more than 25 vendor product
families
They represent a consensus-based initiative by cybersecurity experts globally to help organizations
protect their systems against threats more effectively and confidently
hardening (server hardening)
a combination of
methods, tools, and best practices used to reduce vulnerability in servers and computers
the goal of server hardening:
to lessen network and
IT security risks by shutting down ports and channels used by unnecessary services and
applications
It also includes removing default and automatic configuration settings and activating built-in security features
challenges to hardening embedded/IOT systems
dependability
uneven security updates
attack replication
industrial protocols
device life cycles
remote deployment
dependability
many critical aspects such as utility
grids, transportation infrastructure, and communication systems are controlled by difficult to
patch embedded systems
uneven security updates
most of the embedded
and specialty systems are not upgraded regularly for
security updates
attack replication
since embedded devices are
mass produced, the same version of components
have the same design and build as other devices in
the lot
industrial protocols
embedded systems often
follow a set of custom procedures that are not protected or recognized by enterprise security tools
device life cycles
specialty IoT devices typically
have a much longer lifespan than PCs
remote deployment
many embedded devices are
deployed in the field, outside the enterprise security perimeter; therefore, they may be directly connected to the Internet without the security layers provided in the industrial environment
wireless site surveys
- The first phase of a wireless site survey is to identify all the wireless deployment requirements
- Next, the surveyor should get a diagram of the area the network will cover, preferably with building blueprints:
* Perform a walkthrough and document the infrastructure evaluation - The next step is to look out for places where wireless access points can be mounted, such as ceilings and pillars
* After this, determine the areas to be covered:
* Don’t forget utility rooms that may house wireless equipment
* Indicate areas on the floor plan
* Determine the tentative access point locations:
* Make sure to check the coverage range of your access points
* Build in some overlap between neighboring access points to guarantee seamless roaming,
dynamic load balancing, and network resiliency
wireless analysis
The initial decision should be to acquire an industry
leading wireless analysis and spectrum analysis
toolkit
* A Wi-Fi analyzer is a useful software application that
can report many things about the wireless network
and the networks around you, helping you optimize
your Wi-Fi for best performance
heat map
A Wi-Fi heatmap tool generates a color-coded graphical representation of different wireless
metrics such as signal strength, signal-to-noise
(SNR) ratio levels, and interference in different
areas
mobile deployment models
- bring your own device (BYOD)
- corporate-owned,personally-enabled (COPE)
*choose your own device(CYOD)