Ch7 - Implementing System Security Flashcards
Host-Based Firewalls (Personal Firewall)
A host-based firewall is a piece of software that controls inbound and outbound communication to the system.
A system connected to an untrusted network such as a hotel network or any wireless network should be protected by a host-based firewall.
TCP Wrappers
TCP wrappers is another great access control feature available in Linux. TCP wrappers allows you to control access to different services running on the Linux system such as Telnet, SSH, or FTP. The TCP wrappers feature is easy to implement because you need to configure only two files:
/etc/hosts.allow
This file lists the different services you wish to allow clients to access, and you specify which clients can access those services.
/etc/hosts.deny This file lists the different services you wish to deny access to clients, and allows you to specify which clients are denied access to the different services.
If the client is listed in the allow file and the deny file, then the client is allowed access because the allow file is read first
Host-based Intrusion Detection System (HIDS)
A host-based IDS is responsible for monitoring activity on the system and alerting you of any suspicious activity
Host-based Intrusion Prevention System (HIPS)
A host-based IPS monitors for suspicious activity and then takes corrective action such as locking the system out or disabling network communication
Key Areas that the HIDS/HIPS Monitors:
- Memory
- System files
- Log files
- File system
- Connections
A key point to remember about HIDS as compared with NIDS is that if the network traffic is encrypted, then the NIDS will be unable to detect suspicious traffic. A strong point of using a HIDS is that it doesn’t matter if the network traffic is encrypted because the HIDS does not look there to identify issues.
Protecting Against Malware
- Patch Management
- Using Antivirus & Anti-spam Software
- Phish Filters and Pop-up Blockers
- Practicing Good Habits
a. Surfing
b. E-mail
c. Flash drives
Security Aspects of Mobile Devices You Will Need to Manage:
- Screen locks
- Strong passwords and pins
- Full device encryption
- Remote wipe/sanitation
- Voice encryption
- GPS tracking
- Geofencing
- Geolocation
- Lockout
- Application management
- Content management
- Storage segmentation (Corporate vs. Personal Data)
- Asset tracking
- Inventory control
- Mobile device management
- Device access control
- Removable storage
- Disabling unused features
- Push notification services
- Biometrics
- Context-aware authentication
- Containerization
Context-aware Authentication
Context-aware authentication is a new type of security feature that allows an application or cloud service to be
aware of your habits—for example, the location you usually log on from, or the device you typically use to log on. With context-aware authentication, if the system determines there is high confidence it is actually you using your credentials (based on the context), then you
have a simple logon experience. If the system rates low confidence that it is actually you who is logging in, then it resorts to enforcing a more complicated logon approach involving solutions such as two-factor
authentication.
Considerations for Enforcement on Organization’s Policies
- Third-party app stores
- Rooting/jailbreaking
- Sideloading
- Custom firmware
- Carrier unlocking
- Firmware over-the-air (OTA) updates
- Camera use
- SMS/MMS
- External media
- USB On-the-Go (OTG)
- Recording microphone
- GPS tagging
- Wi-Fi direct/ad hoc
- Tethering
- Payment methods
USB On-the-Go (OTG)
USB On-the-Go (OTG) is a specification that enables a
compliant mobile device to have many different types of devices connect to it. For example, if your mobile device or tablet supports USB OTG, you could connect a communication device such as a keyboard or mouse and use that with your mobile device.
Tethering
Tethering means sharing the mobile device’s Internet
connection with other devices. You may want to restrict the tethering features on the mobile devices to prevent users from sharing their Internet connections in this manner.
Deployment Models
- BYOD The “bring your own device” model
- COPE A “corporate-owned, personally enabled” model
- CYOD A “choose your own device”
- Corporate-owned model
- VDI - Virtual desktop infrastructure
Virtual Desktop Infrastructure (VDI)
Virtual desktop infrastructure is a model where the user uses a thin client to connect to their desktop environment running in a data center. With VDI you can introduce the mobile device as the thin client so that the user can access their desktop environment from anywhere. The benefit is that the resources are not on the mobile device—it simply connects to a virtual desktop within the company.
Data Security
- File permissions
- Encryption
- Data loss prevention (DLP)
Data loss prevention is software or hardware that is designed to analyze information leaving the organization to ensure that sensitive information is not being leaked. DLP can be implemented to monitor network traffic and to identify sensitive information being sent through instant messenger, e-mail, or protocols such as HTTP and FTP. DLP can also analyze data in storage to ensure sensitive information is not being stored in the wrong location. - Cloud storage
- Storage Area Network (SAN)
- Handling Big Data
- Data-in-transit, data-at-rest, data-in-use
Ensure that you are securing the data in storage with permissions or encryption and securing the data in transit with encryption as well. Also ensure that the data is secure when being used by limiting what actions someone can do with that data in the software.
Windows File Permissions
- NTFS Permissions
- Sharing
Sharing the folder is the way you publish the folder to the
network clients. When you share the folder, you specify share permissions as well. Remember that when the NTFS permissions conflict with share folder permissions, the most restrictive permission wins.
For example, if you give the NTFS permission of Modify and the share permission of Read, when users come through the share to access that folder, their permission will be Read because it is more restrictive.