Chapter 5 Securing hosts and data Flashcards

1
Q

A software that creates, runs and manages virtualization?

A

A hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual machines vs containerization? and one draw back of containerization?

A

virtual machines host entirely new sessions of operating systems and everything within it. Whereas containers are isolated boxes that run applications or services seperated from the rest of the current OS - if containers are running on linux host, all containers must then use linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to keep virtual machines secure? considerations

A

Hypervisor, patches and avoiding VM escapes, avoiding VM sprawl avoidance (policies, assesments etc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of arrangement allows users to keep their VM desktops customized?

A

persistence, non-persistence utilizes the same for all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of a baseline? give a brief description on how it might be created and used.

A

Baselines provide a secure standard configuration. A baseline is usually created via a master image that is used across all deployed systems (stock/default for security). The master image is an OS that has been configured for security and tested extensively. Then, automated tools are used to assess changes from that baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do organizations typically deal with patch management?with regards to deployment

A

Patch management is usually deployed in a sandbox environment (such as VM), Third party tools are then used to deploy the patches in a controlled manner, other tools (similar to an NAC) check for these patches, comparing them on end point systems to what is expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What process ensures no unintended outages and accounting for configuration or upgrades?

A

A change management policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When implementing an API list some important components to include:

A

Authentication - depends, possibly 2FA
Authorization - ACLs, rule/role/mandatory/ type of idea.
Security method - TLS is good to encrypt traffic over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FDE vs SDE?

A

Full disk encryption - entire disk is encrypted., also able to encrypt partitions as well (encrypt and decrypt at the file or partition level)
Self encrypting drive - on booting up enter credentials to unencrypt it. (at the drive level)
FDE offers more flexibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An important thing to implement every time the computer starts up? examples?

A

Boot integrity checks. BIOS (basic input/output system), it is physical with software on it (firmware), newer systems use UEFI (unified extensible firmware interface) which is upgraded version ( more performance, less CPU demanding).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a computer store encrypted keys(that relate to the booting process)? and what else does it do with regards to booting?

A

through a hardware chip called the TPM (Trusted platform module), when booting (boot attestation) stores key signatures of particular files. Then, secure boot checks the files against the stored signatures to ensure they haven’t changed. Remote attestation verifies it using a remote system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the difference of an HSM to the similar component?

A

An Hsm is often a removable or external device that generates, stores, and manages keys via assymmetric encryption whereas a TPM is a hardware chip that deals with signatures and boot processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An organization wants to use software that blocks USB devices and prevents outgoing information (sensitive information), what might they implement?

A

Data loss prevention software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protecting against data streams coming in vs going out? tools?

A

Unified threat manager and DLP software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unauthorized flow of data out of a network is called?

A

Data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some examples of SaaS and why are they classified as such?

A

Gmail, Yahoo! Mail, Splunk, Dropbox, they are accessed via a web browser providing someone elses’ software to use/interact with.

17
Q

How is PaaS different from SaaS?

A

PaaS provides its own hardware AND software on its own infrastructure. Provides end users with the infrastructure, tools, storage and networking to build / deploy software. Compared to SaaS it provides a platform rather than just the software.

18
Q

IaaS?

A

Pay-as-you go storage, networking, virtualization, alternatives to on-premise infrastructure. More scalable, more secure but less individualized to business needs.

19
Q

What is XaaS?

A

Anything as a service, may include a combination of all services (S, P and IaaS) as long as it is delivered over the cloud.

20
Q

What are the four cloud deployment models with a brief description of each?(this is not a Iaas, Xaas question)

A

Public - Third party services anyone can pay for, not individualized.
Private - specific to the organization may be internal only, hosting own servers (IaaS?)
Community - Many organizations with similar needs that all require access, a group of franchised schools etc.
Hybrid - combination of two or more.

Public clouds - available to anyone, private only for that organization, community - many, hybrid mix.

21
Q

What role can an MSSP play in cloud services?

A

managed security service provider, basically everything security wise. From patch management, DLP, networking(proxy filters), VPNs, UTM, firewalls, IDS & IPS, they may host these all on the cloud or send out appliances managing them remotely.

22
Q

How does a CSP typically maintain high availability? list 1

A

Multiple load balancing nodes in different geographical locations

23
Q

What types of networks do CSP provides? (4 examples)

A
  1. Virtual networks (soft-ware defined networking to create virtual networks using 1 server)
  2. Public subnets (accessible via internet usually with a screen subnet infront of it) and 3. Private subnets (not accessible via internet). These can both be created via virtual networks.
  3. Segmentation (Like a VLAN) segmenting computers, or networks.
24
Q

On-premise vs off-premise clouds

A

On-premise, all facilities for the cloud (all resources), on the organizations premise. Can still access when at home.
Off-premise - resources are outsourced / rented

25
Q

Who might use on-premise clouds?

A

An organization with sufficient resources, very big, large IT department, can maintain / update / secure it. Want to individualize security, 2fa, AAA etc. But it is expensive.

26
Q

What are the risks of off-premise?

A

Security is managed with a third party, data may be off shore (could be an issue with data possession laws),

27
Q

What is a CASB and why would you need it?

A

Cloud access security broker, it is software or a service, monitors traffic and enforces policies. Those with higher security requirements, helps to mitigate tasks.

28
Q

Purpose of a SWG?

A

Next-gen secure web gateway provides proxy services for traffic and scanning for malware, DLP, sandboxes. It is a cloud-based service.

29
Q

Edge vs Fog computing

A

Edge computing stores + processes data close to devices that are generating and using the data. Processing cruise control in a car computer vs sending the data to be processed afar. One is quick, convenient and appropriate for the situation.
Fog computing sends it to a node near the device within a fog network.

30
Q

List of models of device deployment a coorperation may employ

A

Corporate owned

COpersonally enabled (employees are free to use the device as they wish but managed by the corp),

BYOD (bring your own device (employees must adhere to policies, personally responsible for managing deviice),

ChooseYOdevice (employee purchases device based on a list, similar to COPenabled)

31
Q

What is a UEM tool for MDM and what does it typically do?

A

Unified endpoint management for mobile devices, keeps systems up to date, antivirus software, application management

32
Q

Uses of an MDM?

A

Application management, FDE, storage segmentation (partitions), content management (ensure encryption when storing corp data), containerization, passwords, biometrics and screen locks, remote wipes.

33
Q

Geolocation vs geofencing vs geotagging and what might a combination of these be used for?

A

One locates (lost device for example), other gets fenced out if they aren’t in the right place. Geotagging adds metadata to files. Context-aware authentication uses multiple of these (geolocation, geofence, time of day/device type) to authenticate.

34
Q

ICS is a broad term for what system

A

Industrustrial control systems, like SCADA, supervisory control and data acquisition

35
Q

What are the constraints of embedded systems?

A

Computational power
Cryptographic processing (limited processing power)
Power (don’t have their own power systems)
Range (using wireless but limited power and thus range)
Authentication (often skipped)
Network (doesn’t have interface, often default)
Cost (kept low, minimizing security features)
Inability to patch
Implied trust (vulnerabilities that aren’t reported or known)

36
Q
A