Chapter 5 Flashcards
Securing Hosts and Data
Least Functionality
A core principle of secure systems design
Systems should be deployed with only the applications, services, and protocols needed to meet their purpose
Trusted Operating System
An operating system that is configured to meet a set of security requirements
It ensures that only authorized personnel can access data based on their permissions
Patch Management
The process used to keep systems up to date with current patches
It typically includes evaluating and testing patches before deploying them
Change Management
The process used to prevent unauthorized changes
Unauthorized changes often result in unintended outages
Application whitelist
A list of application that a system allows
Users are only able to install or run applications on the list
Application Blacklist
A list of applications that a system blocks
Users are unable to install or run any applications on the list
Sandboxing
The use of an isolated area on a system, typically for testing
Virtual machines are often used to test patches in an isolated sandbox
Application developers sometimes use the chroot command to change the root directory crating a sandbox
Chroot
A Linux command used to change the root directory
It is often used for sandboxing
EMI
Electromagnetic interference is an interference caused by motors, power lines, and fluorescent lights
EMI shielding prevents outside interference sources from corrupting data and prevents data from emanating outside the cable
EMP
Electromagnetic Pulse is a short burst of energy that can potentially damage electronic equipment
It can result from electrostatic discharge (ESD), lightning, and military weapons
FDE
Full disk encryption is a method to encrypt an entire disk
Compared with SED
SED
Self-encrypting drive is a device that includes he hardware and software necessary to encrypt a hard drive
Users typically enter credentials to decrypt and use the drive
BIOS
Basic Input/Output System is a computers firmware used to manipulate different settings such as the date and time, boot drive, and access password
UEFI is the designated replacement for BIOS
UEFI
Unified Extensible Firmware Interface is a method used to boot some systems and intended to replace BIOS firmware
TPM
Trusted Platform Module is a hardware chip on the motherboard included with many laptops and some mobile devices
It provides full disk encryption
Compare with HSM
Secure Boot
A process that checks and validates system files during the boot process
A TPM typically uses a secure boot process
Attestation
A process that checks and validates system files during the boot process
TPMs sometimes used remote attestation, sending a report to a remote system for attestation
Hardware Root of Trust
A known secure starting point
TPMs have a private key burned into the hardware that provides a hardware root of trust
HSM
Hardware security module is a removable or external device that van generate, store, and manage RSA keys used in asymmetric encryption
Compare wirh TPM
SaaS
Software as a Service is a cloud computing model that provides applications over the internet
Webmail is an example of a cloud based technology
Compare with IaaS and PaaS
PaaS
Platform as a Service is a cloud computing model that provides cloud customers with a preconfigured computing platform they can use as needed
Compare with IaaS and SaaS
IaaS
Infrastructure as a service is a cloud computing model that allows an organization to rent access to hardware in a self-managed platform
Compare with PaaS and SaaS
CASB
Filler
Cloud Deployment models
Cloud model types that identify who has access to cloud resources
Public clouds are for any organization
Private clouds are for a single organization
Community clouds are shared among community organizations
A hybrid cloud is a combination of two or more clouds
MDM
Mobile device management is a group of applications and/or technologies used to manage mobile devices
MDM tools can monitor mobile devices and ensure they ate in compliance with security policies
Application Management
Filler
Full Device Encryption
Filler