Ch 5. Securing Hosts/Data Flashcards

1
Q

Least Functionality

A

a core security principle stating that systems should be deployed with the least amount of applications, services, and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Backdoor

A

an access point to an application or service that bypasses normal security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trusted Operating System

A

meets a set of predetermined requirements, such as those identified in the Common Criteria. It uses the mandatory access control (MAC) model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Patch Management

A

ensures that systems and applications stay up to date with current patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Change Management

A

defines the process and accounting structure for handling modifications and upgrades. The goals are to reduce risks related to unintended outages and provide documentation for all changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sandboxing

A

the use of an isolated area for testing. You can create one with a virtual environment and on Linux with the chroot command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EMI

A

Electromagnetic Interference; comes from sources such as motors, power lines, and fluorescent lights and can interfere with signals transmitted over wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EMP

A

Electromagnetic Pulse; a short burst of energy that can cause damage to computing equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FDE

A

Full Disk Encryption; encrypts an entire disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SED

A

Self-Encrypting Drive; includes the hardware and software to encrypt all data on the drive and securely store the encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIOS

A

Basic Input/Output System; includes software that provides a computer with basic instructions on how to start. Often referred to as firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

UEFI

A

Unified Extensible Firmware Interface; like BIOS but with enhancements such as being CPU-independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TPM

A

Trusted Platform Module; a hardware chip on the computer’s motherboard that stores cryptographic keys used for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure Boot

A

process that checks and validates system files during the boot process. A TPM typically uses a secure boot process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attestation

A

sends a report to a stored system to check and validate system files during the boot process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware Root of Trust

A

a known secure starting point. TPMs have a private key (RSA) burned into the hardware that provides a hardware root of trust

17
Q

HSM

A

Hardware Security Module; a removable or external device that can generate, store, and mange RSA keys used in asymmetric encryption. Many server-based applications use an HSM to protect keys

18
Q

CASB

A

Cloud Access Security Broker; a software tool or service deployed between an organization’s network and the cloud provider. It provides Security as a Service by monitoring traffic and enforcing security policies

19
Q

Four models of Cloud Deployment

A

Public, Private, Community, Hybrid

20
Q

MDM

A

Mobile Device Management; helps enforce security policies on mobile devices

21
Q

tethering

A

the process of sharing a mobile device’s Internet connection with other devices

22
Q

WiFi Direct

A

a standard that allows devices to connect without a wireless access point

23
Q

Embedded Systems

A

any device that has a dedicated function and uses a computer system to perform that function

24
Q

SoC

A

system on a chip; an integrated circuit that includes all the functionality of a computing system within the hardware.

25
Q

ICS

A

Industrial Control System; typically refers to systems within large facilities such as power plants or water treatment facilities

26
Q

SCADA

A

Supervisory Control and Data Acquisition; a system that controls an ICS such as a power plant or water treatment facility.

27
Q

RTOS

A

Real Time Operating System; an OS that reacts to input within a specific time. If it can’t respond within the specific time than it doesn’t process the data and typically reports an error

28
Q

Data Exfiltration

A

the unauthorized transfer of data outside an organization