ch 9 Flashcards
BIOS
Basic input/output system
UEFI
unified extensible firmware interface
what was made to combat BIOS attacks
(UEFI) unified extensible firmware interface
what is the secure boot process
when using UEFI and secure boot, a computer checks the digital signature of each piece of boot software. if signatures are deem valid the computer boots.
what happens if the computer does not deem the boot valid
the computer doesn’t start
(TEMPEST)
telecommunications electronics material protected from emanating spurious transmissions
what is TEMPEST
intended to prevent attackers from picking up electromagnetic fields from government buildings.
what happens during a supply chain infection
steps in the supply chain has opened the door for malware to be injected into products during their manufacturing or storage.
what to for OS security configuration
Disabling unnecessary ports and services,
disabling defaults accounts/ passwords
employing least functionality
application white listing and black listing
what is a software security update to repair vulnerabilities
security patch
what includes enhancements to the software to provide new or expanded functionality, does not address security vulnerability
feature update
what accumulates security updates and additional features
service patch
what manages patches locally rather than rely on the vendor’s online update service
automated patch update service
updates that are applied no matter what
forced updates
software that examines a computer for infections, scans new documents that might contain viruses
antivirus
what is the weakness of antivirus
vendor must continually search for new viruses, update and distribute signature files to users
what is a newer approach to (AV) Antivirus that has heuristic monitoring
dynamic analysis
one AV heuristic monitoring technique, questionable code is executed in virtual environment to determine if it is a virus.
code emulation
monitors emails for span and other unwanted content
antispam- mail gateway
define black listing
nonapproved senders
define whitelisting
approved senders
what devides email messages into two piles spam and non spam
bayeasian filtering
what helps prevent computers from becoming infected by different types of spyware
antispyware
small window appearing over website usually created by advertisers
pop-up
s separate program as part of anti-spyware package
pop-up blockers
tightening security during the design and coding of the OS
OS Hardening
an OS that has been designed through OS hardening
trusted OS
Removing all unnecessary features that may compromise an OS
kernel pruning
(SDIO)
Secure digital input output
a storage cad with integrated wireless transmission capabilities
SDIO Secure digital input output
An SDIO device used in devices like digital cameras
WIFI enabled micro SD card
uses internal storage and external SD cards
Digital cameras
(MFD)
Multifunctional devices
combines the functions of a printer, copier, scanner, and fax machine
MFD Multifunctional devices
(DLP)
Data loss prevention
whats the alternative name for displays
often considered “passive” peripherals
what is a bollard
vertical post, preventing a car from ramming into the building
are security guards considered active security elements ?
yes
(PDS)
Protection Distribution system
a system of cable conduits used to protect classified information that is being transmitted between two secure areas
(PDS) Protected Distribution system
Conduit contructed of special electrical metallic tubing
hardened carrier PDS
specialized optical fibers in the conduit that sense acoustic vibrations that occur when an intruder attempts to gain access
alarmed carrier PDS
the physical security protecting the hardware of the host system
computer hardware system
what are the aspects of application security
application development security
secure coding techniques
code testing
what are the application development stages
development
testing
staging
production
what are the application development life cycles
waterfall model
agile model
what does the secure devops methodology include
security automation continuous integration immutable systems infrastructure as code base lining
what is provisioning
the enterprise wide configuration, development, and management of multiple types of IT system resources
what is deprovisioning
in application development is removing a resource that is no longer needed.
test is used to ensure that the projected application meets all specifications at that point
model verification
searches for errors that could prevent the application from properly compiling from source code to application code
compiled code testing
looks for errors after the program has compiled correctly and is running
runtime code testing
which is a testing environments that isolates the untested code from the live production environment
sandbox
tools that examine software without executing the program
static program analyzers