Ch 5. Securing Hosts/Data Flashcards
Least Functionality
a core security principle stating that systems should be deployed with the least amount of applications, services, and protocols
Backdoor
an access point to an application or service that bypasses normal security mechanisms
Trusted Operating System
meets a set of predetermined requirements, such as those identified in the Common Criteria. It uses the mandatory access control (MAC) model.
Patch Management
ensures that systems and applications stay up to date with current patches
Change Management
defines the process and accounting structure for handling modifications and upgrades. The goals are to reduce risks related to unintended outages and provide documentation for all changes
Sandboxing
the use of an isolated area for testing. You can create one with a virtual environment and on Linux with the chroot command.
EMI
Electromagnetic Interference; comes from sources such as motors, power lines, and fluorescent lights and can interfere with signals transmitted over wires
EMP
Electromagnetic Pulse; a short burst of energy that can cause damage to computing equipment
FDE
Full Disk Encryption; encrypts an entire disk
SED
Self-Encrypting Drive; includes the hardware and software to encrypt all data on the drive and securely store the encryption keys
BIOS
Basic Input/Output System; includes software that provides a computer with basic instructions on how to start. Often referred to as firmware
UEFI
Unified Extensible Firmware Interface; like BIOS but with enhancements such as being CPU-independent
TPM
Trusted Platform Module; a hardware chip on the computer’s motherboard that stores cryptographic keys used for encryption
Secure Boot
process that checks and validates system files during the boot process. A TPM typically uses a secure boot process
Attestation
sends a report to a stored system to check and validate system files during the boot process