Chapter 11 - Endpoint Security Flashcards

1
Q

What are some of the most common ways in which operating systems can be vulnerable?

A
  1. Vulnerabilities in the OS code
  2. Defaults (default passwords, insecure default settings)
  3. Configurations (intentional but insecure)
  4. Misconfigurations (unintentional and insecure)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firmware

A

Firmware is the embedded software that allows devices to function. It is tightly connected to the hardware of a device and may or may not be possible to update depending on the design and implementation of the device’s hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

End-of-Life/Legacy Hardware

A

End-of-Life/Legacy Hardware drives will eventually lack support. Once a device or system has reached end-of-life, they typically will also reach the end of their support from the manufacturer. This means that there will no longer be any security fixes/patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Endpoint

A

Endpoints, in a wired/wireless network, are devices such as desktops, smartphones, servers, and a variety of other systems found in organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two common techniques that UEFI firmware can leverage to ensure that a system is booting securely?

A
  1. Secure Boot
  2. Measured Boot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secure Boot

A

Secure Boot ensures that the system boots using only software that the original equipment manufacturer (OEM) trusts. To perform a Secure Boot operation, the system must have a signature database listing the secure signatures of trusted software and firmware for the boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key Management System (KMS)

A

Key Management Systems are used to store keys and certificates as well as to manage them centrally. A KMS provides a means of managing keys/secrets while a Hardware Security Module (HSM) is used for key generation.

KSM = Key Management/Governance
HSM = Key Generation/Cryptographic Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Measured Boot

A

Measured Boot processes measure each component, starting with the firmware and ending with the boot start drivers. Measured Boot does not validate against a known good list of signatures before booting; instead, it relies on the UEFI firmware to hash the firmware, boot-loader, drivers and anything else that is part of the boot process. This data is stored in the Trusted Platform Module (TPM), and the logs can be validated at a remote server to let security administrators know the boot state of the system. This process allows the remote server to make decisions about the state of the system based on the information it provides, allowing access control and quarantine options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trusted Platform Module (TPM)

A

A Trusted Platform Module is a chip that is built into many computers. TPM chips are frequently used to provide built-in encryption, and they provide three major functions:

  1. Remote attestation, allowing hardware and software configurations to be verified
  2. Binding, which encrypts data
  3. Sealing, which encrypts data and sets requirements for the state of the TPM chip before decryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Apple Secure Enclave

A

Apple’s Secure Enclave is a dedicated secure element that is built into Apple’s system-on-chip (SoC) modules. They provide hardware key management, which is isolated from the main CPU, protecting keys throughout their life cycle and usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sandbox

A

Sandbox, in the context of endpoint security, describes an isolated environment where potentially dangerous or problematic software can run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Allow List/Whitelist

A

An Allow List allows you to build a list of software, applications, and other system components that are allowed to exist and run on a system. If they are not on the list, they will be removed, disabled, or not installed in the first place. Allow Lists are more secure than Deny Lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Deny List/Block List/Blacklist

A

Deny Lists are lists of software or applications that cannot be installed or run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Endpoint Detection and Response (EDR)

A

Endpoint Detection and Response tools combine monitoring capabilities on endpoint devices and systems using a client or software agent with network monitoring and log analysis capabilities to collect, correlate, and analyze events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Extended Detection and Response (XDR)

A

Extended Detection and Response tools consider not only endpoints but the full breadth of an organization’s technology stack, including cloud services, security services and platforms, email, and similar components. XDR tools will use detection algorithms, AI, and machine learning to analyze the data to find issues and help security staff respond to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Loss Prevention (DLP)

A

Data Loss Prevention tools may be deployed to endpoints in the form of clients or applications. These tools also commonly have network and server-resident components to ensure that data is managed throughout its life cycle and various handling processes.

The primary goal of DLP is to ensure that data does not leave the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Host-Based Intrusion Prevention System (HIPS)

A

Host-Based Intrusion Prevention Systems analyze traffic before services or applications on the host process it. A HIPS can take action on that traffic, including filtering out malicious traffic or blocking specific elements of the data that is received. A HIPS can sometimes block legitimate traffic, when a misidentification or misconfiguration occurs.

18
Q

Host-Based Intrusion Detection System (HIDS)

A

Host-Based Intrusion Detection Systems cannot take action to block traffic. Instead, a HIDS can only report and alert on issues.

19
Q

DNS (Port #)

A

53 TCP and UDP

20
Q

NetBIOS (Port #)

A

125-139 TCP and UDP

21
Q

LDAP (Port #)

A

389 TCP and UDP

22
Q

RDP (Port #)

A

3389 TCP and UDP

23
Q

Windows Group Policy

A

Group Policy provides Windows systems and domains with the ability to control settings through Group Policy Objects (GPOs). GPOs can define a wide range of options from disabling guest accounts and setting password minimum lengths to restricting software installations. GPOs can be applied locally or via Active Directory.

24
Q

SELinux

A

SELinux, or Security-Enhanced Linux, is a kernel-based security module that provides additional security capabilities and options on top of existing Linux distributions.

25
Q

Configuration Management

A

Configuration Management tools are one of the most powerful options security professionals and system administrators have to ensure that the multitude of systems in their organizations have the right security settings and to help keep them safe.

26
Q

Baseline Configuration

A

Baseline Configurations are often used for operating system types throughout an organization. For example, you might choose to configure a baseline configuration for Windows 11 desktops, Windows 11 laptops, and macOS laptops.

27
Q

Configuration Enforcement

A

Configuration Enforcement is a process that not only monitors for changes but makes changes to system configurations as needed to ensure that the configuration remains in its desired state.

28
Q

What are the three phases of a baseline’s life cycle?

A
  1. Establishing a baseline
  2. Deploying a baseline
  3. Maintaining a baseline
29
Q

Patching

A

Patching, in the context of security, decreases how long exploits and flaws can be used against systems. However, patching also has its own set of risks. Patches may introduce new flaws, or the patching process itself can sometimes cause issues.

30
Q

Self-Encrypting Drive (SED)

A

Self-Encrypting Drives implement encryption capabilities in their hardware and firmware. Systems equipped with a self-encrypting drive require a key to boot from the drive, which may be entered manually or provided by a hardware token or device.

31
Q

Embedded Systems

A

Embedded Systems are computer systems that are built into other devices. Industrial machinery, appliances, and cars are all places where you may have encountered embedded systems.

32
Q

Real-Time Operating System (RTOS)

A

Real-Time Operating Systems are operating systems that are used when priority needs to be placed on processing data as it comes in, rather than using interrupts for the operating system or waiting for tasks being processed to be handled before data is processed.

33
Q

What are some examples of embedded devices?

A
  1. Medical systems
  2. Smart meters (track utility usage)
  3. Vehicles (car, aircraft, ships)
  4. Drones
  5. VoIP systems
  6. Printers
  7. Surveillance systems
34
Q

Supervisory Control and Data Acquisition (SCADA)

A

SCADA often refers to large industrial systems that cover large areas. SCADA is a type of system architecture that combines data acquisition and control devices, computers, communications capabilities, and an interface to control and monitor the entire architecture. SCADA systems are commonly found running complex manufacturing and industrial processes, where the ability to monitor, adjust, and control the entire process is critical to success.

35
Q

Industrial Control System (ICS)

A

Industrial Control System is a broad term for industrial automation.

36
Q

Enumeration

A

Enumeration is typically associated with scanning to identify assets, and some organizations use port and vulnerability scans to help identify systems that aren’t part of their inventory.

37
Q

Degaussing

A

Degaussing is a relatively quick way to destroy the data on magnetic media such as an HDD. This process exposes the magnetic media to very strong electromagnetic fields, scrambling the patterns of bits written to the tape or drive.

38
Q

Certificate of Destruction

A

Certificates of Destruction are used to document that assets were decommissioned.

39
Q

Retention

A

Retention of data may be required for legal purposes with set retention periods determined by law, or retention may be associated with a legal case due to a legal hold.

40
Q

FTP (Port #)

A

21 TCP

41
Q

Telnet (Port #)

A

23 TCP