Chapter 3: Computer Systems Security Flashcards
Statistical Anomaly IDS
Establishes baseline and compares current performance
Signature based IDS
Network traffic analyzed to find predetermined patterns
Data Loss Prevention
Monitors data in use / in motion / at rest
Prevents unauthorized use and leakage of data
Types of DLP
> Endpoint DLP : Runs on single machine, software based
> Network DLP : Software/hardware, installed on network perimeter
> Storage DLP : Installed in data centers/server rooms
Securing Computer Hardware and Peripherals
Securing Removable Storage
> Typically prohibits all removable storage besides specific ones
> Removable Media Controls
USB Lockdown (BIOS), limit USB use, malware scans, audits
Securing NAS
> Built for high availability (no downtime)
> Commonly implemented as RAID array (levels depend on situation)
> Use encryption, authentication, secure logging etc