Chapter 5 Flashcards

Securing Hosts and Data

1
Q

Least Functionality

A

A core principle of secure systems design

Systems should be deployed with only the applications, services, and protocols needed to meet their purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trusted Operating System

A

An operating system that is configured to meet a set of security requirements

It ensures that only authorized personnel can access data based on their permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Patch Management

A

The process used to keep systems up to date with current patches

It typically includes evaluating and testing patches before deploying them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Change Management

A

The process used to prevent unauthorized changes

Unauthorized changes often result in unintended outages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application whitelist

A

A list of application that a system allows

Users are only able to install or run applications on the list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Blacklist

A

A list of applications that a system blocks

Users are unable to install or run any applications on the list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sandboxing

A

The use of an isolated area on a system, typically for testing

Virtual machines are often used to test patches in an isolated sandbox

Application developers sometimes use the chroot command to change the root directory crating a sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Chroot

A

A Linux command used to change the root directory

It is often used for sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EMI

A

Electromagnetic interference is an interference caused by motors, power lines, and fluorescent lights

EMI shielding prevents outside interference sources from corrupting data and prevents data from emanating outside the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EMP

A

Electromagnetic Pulse is a short burst of energy that can potentially damage electronic equipment

It can result from electrostatic discharge (ESD), lightning, and military weapons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FDE

A

Full disk encryption is a method to encrypt an entire disk

Compared with SED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SED

A

Self-encrypting drive is a device that includes he hardware and software necessary to encrypt a hard drive

Users typically enter credentials to decrypt and use the drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BIOS

A

Basic Input/Output System is a computers firmware used to manipulate different settings such as the date and time, boot drive, and access password

UEFI is the designated replacement for BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UEFI

A

Unified Extensible Firmware Interface is a method used to boot some systems and intended to replace BIOS firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TPM

A

Trusted Platform Module is a hardware chip on the motherboard included with many laptops and some mobile devices

It provides full disk encryption

Compare with HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure Boot

A

A process that checks and validates system files during the boot process

A TPM typically uses a secure boot process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attestation

A

A process that checks and validates system files during the boot process

TPMs sometimes used remote attestation, sending a report to a remote system for attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hardware Root of Trust

A

A known secure starting point

TPMs have a private key burned into the hardware that provides a hardware root of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HSM

A

Hardware security module is a removable or external device that van generate, store, and manage RSA keys used in asymmetric encryption

Compare wirh TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SaaS

A

Software as a Service is a cloud computing model that provides applications over the internet

Webmail is an example of a cloud based technology

Compare with IaaS and PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PaaS

A

Platform as a Service is a cloud computing model that provides cloud customers with a preconfigured computing platform they can use as needed

Compare with IaaS and SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IaaS

A

Infrastructure as a service is a cloud computing model that allows an organization to rent access to hardware in a self-managed platform

Compare with PaaS and SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CASB

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cloud Deployment models

A

Cloud model types that identify who has access to cloud resources

Public clouds are for any organization

Private clouds are for a single organization

Community clouds are shared among community organizations

A hybrid cloud is a combination of two or more clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

MDM

A

Mobile device management is a group of applications and/or technologies used to manage mobile devices

MDM tools can monitor mobile devices and ensure they ate in compliance with security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Application Management

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Full Device Encryption

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Storage Segmentation

A

A method used to isolate data on mobile devices

It allows personal data to be stored in one location and encrypted corporate data to be stored elsewhere

29
Q

Content management

A

Filler

30
Q

Containerization

A

A method used to isolate applications in mobile devices

It isolates and protects the application, including any data used by the application

31
Q

Passwords and PINs

A

Filler

32
Q

Biometrics

A

Filler

33
Q

Screen Locks

A

Filler

34
Q

Remote Wipe

A

The process of sending a signal to a remote device to erase all data

It is useful when a mobile device is lost or stolen

35
Q

Geolocation

A

The location of a device identified by GPS

It can help locate a lost or stolen mobile device

36
Q

Geofencing

A

A virtual fence or geographic boundary

It uses GPS to create the boundary

Apps can then respond when a mobile device is within the virtual fence

37
Q

GPS Tagging

A

A process of adding geographical data to files such as pictures

It typically includes latitude and longitude coordinates of the location where the picture was taken or the file was created

38
Q

Context-Aware

A

An authentication method using multiple elements to authenticate a user and a mobile device

It can include identity, geolocation, the device type, and more

39
Q

Push Notification Services

A

The services that messages to mobile devices

40
Q

Third Party App Store

A

An app store other than the primary source for mobile device apps

It refers to an app store other than the App Store or Google Play for Apple and Android devices, respectively

41
Q

Jailbreaking

A

The process of modifying an Apple mobile device to remove software restrictions

It allows a user to install software from any third-party source

Compare with rooting

42
Q

Rooting

A

The process of modifying an Android device, giving the user root-level, or administrator, access

Compare with Jailbreaking

43
Q

Firmware OTA Updates

A

Over-the-air updates for mobile device firmware that keep them up to date

These are typically downloaded to the device from the Internet and applied to update the device

44
Q

Custom Firmware

A

Mobile device firmware other than the firmware provided with the device

People sometimes use custom firmware to root Android devices

45
Q

Sideloading

A

The process of copying an application package to a mobile device

It is useful for developers when testing apps, but can be risky if users sideload unauthorized apps to their device

46
Q

SMS

A

Short Message Service is a basic text messaging service

Compare with MS

47
Q

MMS

A

Multimedia Messaging Service is a method used to send text messages

It is an extension of SMS and supports sending multimedia content

48
Q

USB OTG

A

Universal Serial Bus On-The-Go is a cable used to connect mobile devises to other devices

It is one of many methods that you can use to connect a mobile device to external media

49
Q

Tethering

A

The process of sharing an Internet connection from one mobile device to another

50
Q

Wi-Fi Direct

A

A standard that allows devices to connect without a wireless access point

51
Q

Carrier Unlocking

A

The process of unlocking a mobile phone from a specific cellular provider

52
Q

Embedded System

A

Any device that has a dedicated function and uses a computer system to perform that function

It includes a CPU, an operating system, and one or more applications

53
Q

IoT

A

Internet of things is the network of physical devices connected to the Internet

It typically refers to smart devices with an IP address, such as wearable technology and home automation systems

54
Q

Wearable Technology

A

Smart devices that a person can wear or have implanted

55
Q

Home Automation

A

Smart devices used within the home that have IP addresses

These are typically accessible via the Internet and are part of the Internet of things (IoT)

56
Q

SoC

A

System on a chip is an integrated circuit that includes a computing system within the hardware

Many mobile devices include an S0C

57
Q

ICS

A

Industrial control system is a system that controls large systems such as power plants or water treatment facilities

A SCADA system controls the ICS

58
Q

SCADA

A

Supervisory control and data acquisition is a system used to control an ICS such as power plant or water treatment facility

Ideally, a SCADA is within an isolated network

59
Q

RTOS

A

Real-time operating system is an operating system that reacts to input within a specific time

Many embedded systems include an RTOS

60
Q

HVAC

A

Heating, ventilation, and air conditioning is a physical security control that increases availability by regulating airflow within data centers and server rooms

61
Q

UAVs

A

Unmanned aerial vehicles are flying vehicles piloted by remote control or onboard computers

62
Q

EFS

A

Filler

63
Q

NTFS

A

Filler

64
Q

ACLs

A

Access control lists are lists of rules used by routers and stateless firewalls

These devices use the ACL to control traffic based on networks, subnets, IP addresses, ports, and some protocols

65
Q

GPG

A

Filler

66
Q

Linux Permissions

A

Filler

67
Q

Windows Permissions

A

Filler

68
Q

DLP

A

Data loss prevention is a group of technologies used to prevent data loss

They can block the use of the USB devices, monitor outgoing email to detect and block unauthorized data transfers, and monitor data stored in the cloud

69
Q

Data Exfiltration

A

The unauthorized transfer of data outside an organization