Chapter 5: Securing Hosts and Data Flashcards

1
Q

What is Virtualization?

A

The creation of virtual instances of computing resources- like servers, storage, or networks, on a single physical machine using a hypervisor, improving efficiency, scalability, and isolation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Hypervisor?

A

Software that creates and managed virtual machines by allocating hardware resources, allowing multiple OSes to run on one physical machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In virtualization, what is a Host?

A

The physical machine that runs the hypervisor and provides hardware resources to virtual machines (guests).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In virtualization, what is a Guest?

A

A virtual machine running on a host system, managed by a hypervisor, with its own OS and virtual hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Cloud Scalability?

A

The ability of a cloud system to handle increasing workloads by adding or upgrading resources over time (either vertically or horizontally).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Cloud Elasticity?

A

The ability of a cloud system to automatically scale resources up or dowin in real-time based on workload demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Thin Client?

A

A minimal computer that depends on a central server for processing and storage, commonly used to access virtual desktops or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Virtual Desktop Infrastructure (VDI)?

A

A system that delivers desktop environments from a central server to end-user devices like thin clients, enabling remote and centralized desktop access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Containerization?

A

A lightweight virtualization method where apps and their dependencies are packed into containers that run in isolated environments, sharing the host OS kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is VM Escape?

A

A security exploit where an attacker breaks out of a virtual machine and gains access to the host or other VMs, violating isolation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is VM Sprawl?

A

A situation where unmanaged growth of virtual machines causes inefficiencies, security risks, and administrative challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Resource Reuse?

A

Refers to the potential for data or resources to remain on a shared infrastructure after a customer has finished using them, making them potentially accessible for other users of the cloud service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What benefits does Replication offer VMs?

A

Replication provides high availability, disaster recovery, fast failover, and safe environments for testing without affecting production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Snapshots?

A

A saved state of a VM at a specific point in time, used to restore the VM to that exact state later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an endpoint?

A

Computing devices such as servers, VMs, desktops, laptops, mobile devices, or IoT devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Antivirus software?

A

Detects, prevents, and removes malware using methods like signature-based detection, heuristics, and real-time protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Endpoint Detection and Response (EDR)?

A

Monitors endpoints for threats, analyzes behavior, and provides real-time alerts and responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Extended Detection and Response (XDR)?

A

A unified security solution that integrated data from endpoints, networks, cloud, and more to detect and respond to threats more effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Host Intrusion Prevention Systems (HIPS)?

A

Endpoint software that detects and blocks malicious activity using signatures and behavior analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the context of endpoints, what is Hardening?

A

Endpoint hardening is the process of securing devices by minimizing vulnerabilities, applying patches, disabling unnecessary services, and using security measures like encryption and access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Configuration Management?

A

The process of managing and maintaining consistent system settings and configurations to ensure operational effectiveness, security, and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In configuration management, what is a Baseline?

A

A baseline in configuration management is an approved and documented set of configuration settings that serves as a reference point for future changes, ensuring system consistency and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an Image?

A

A replica or snapshot of a system’s configuration, including the OS, applications, and settings, used for rapid system deployment or restoration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Master Image?

A

A master image is a pre-configured, optimized base image used as a template for creating consistent, identical system configurations across multiple devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Secure Starting Point?

A

Refers to a baselines configuration that ensures systems are securely configured before deployment, with key security measures like encryption, access control, and patching in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are Reduced Costs in Cybersecurity?

A

Occurs when preventative measures, automation, and effective risk management minimizes the financial impact of cyber incidents, avoiding costly breaches, fines, and reputational damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a Patch?

A

A software update that fixes vulnerabilities, corrects bugs, or adds new features to enhance security and functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Patch Management?

A

The process of acquiring, testing, and deploying software patches to keep systems secure and up-to-date, ensuring that vulnerabilities are mitigated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is Change Management?

A

The systemic process for managing changes in IT systems to ensure that changes are made with minimal risk, disruption, and that they are properly planned and documented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is an Application Allow List?

A

A security measure where only pre-approved applications are allowed to run on a system, preventing unauthorized software from executing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is an Application Block List?

A

A security approach that prevents known malicious or untrusted applications from running while allowing all other applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Full Disk Encryption (FDE)?

A

A software-based program that encrypts the entire hard drive of a device, making all data inaccessible without proper decryption credentials, even if the device is stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Self-Encrypting Drives (SED)?

A

A hardware-based storage device that automatically encrypts and decrypts data as it’s written and read, using an onboard encryption engine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Boot Integrity?

A

Ensures that only trusted and untampered code is run during the system’s startup process, protecting against unauthorized modifications at boot time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Measured Boot?

A

Conducts enough of the boot process to perform checks without allowing the user to interact with the system. If it detects that the system has lost integrity and can no longer be trusted, the system won’t boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the Basic Input/Output System (BIOS)?

A

A legacy firmware interface that initializes hardware and starts the OS using the Master Boot Record (MBR) during the boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the Unified Extensible Firmware Interface (UEFI)?

A

A modern firmware interface that replaces BIOS, offering enhanced booting security, faster startup, and support for larger drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a Trusted Platform Module (TPM)?

A

A hardware chip that securely store cryptographic keys and system integrity measurements to support security features like encryption and Measured Boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is Boot Attestation?

A

A process where cryptographic measurements from the boot process are sent to a remote server to verify system integrity and trustworthiness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a Hardware Root of Trust?

A

A trusted, tamper-resistant hardware component that verifies the integrity of the system’s boot process and establishes a secure foundation for system trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is Secure Boot?

A

A feature that ensures only digitally signed, trusted software runs during system startup, protecting against boot-time malware and tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is Remote Attestation?

A

A process where a system proves to a remote verifier that its hardware and software have not been tampered with, using cryptographic boot measurements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a Hardware Security Module (HSM)?

A

A tamper-resistant device that securely manages, generates, and stores cryptographic keys and performs secure encryption operations.

44
Q

What is MicroSD HSM?

A

A compact hardware security module that fits in a MicroSD slot and securely performs cryptographic operations and stores encryption keys.

45
Q

What is Decommissioning?

A

A secure and systematic retirement of IT assets, including secure data removal and proper disposal.

46
Q

What is Legacy Hardware?

A

Outdated or unsupported hardware that remains in use, often posing security and compatibility challenges.

47
Q

What is End-of-life (EOL) Hardware?

A

Hardware that is no longer supported or maintained by the manufacturer, making it vulnerable and unsuitable for continued use.

48
Q

What is Data Exfiltration?

A

The unauthorized transfer of data from a system, often by attackers of insiders.

49
Q

What is Data Loss Prevention (DLP)?

A

A set of technologies and strategies to detect and prevent the unauthorized sharing or leakage of data.

50
Q

What is Removable Media?

A

Portable storage devices that can be connected and removed from a computer, often carrying data or malware risks.

51
Q

What is Data-in-use?

A

Data that is actively being accessed or processed in memory, and is vulnerable to attacks during that state.

52
Q

What is a Secure Enclave?

A

A hardware-isolated area for processing sensitive data securely, protecting it even if the main system is compromised.

53
Q

What is Cloud Computing?

A

The on-demand delivery of IT resources over the Internet, providing scalable and flexible services without owning physical hardware.

54
Q

What is a Cloud Delivery Model?

A

A method of delivering cloud services–SaaS, PaaS, or Iaas–based on the level of control and responsibility between provider and user.

55
Q

What is Software as a Service (SaaS)?

A

A cloud model where users access fully-managed applications over the Internet without handling the underlying infrastructure.

56
Q

What is Platform as a Service (PaaS)?

A

A cloud model that provides a platform for developers to build and deploy apps without managed the underlying hardware or OS.

57
Q

What is Serverless Computing?

A

A cloud model where the provider manages infrastructure, allowing developers to focus solely on writing and deploying code.

58
Q

What is Infrastructure as a Service (IaaS)?

A

A cloud model providing virtualized computing resources online, where users manage their own software and the provider handles hardware.

59
Q

What is a Cloud Deployment Model?

A

A strategy for deploying cloud services, such as public, private, hybrid, or community clouds, based on access and control needs.

60
Q

What is the Public Cloud?

A

A cloud environment offered by third parties to multiple users, providing scalability and ease of use.

61
Q

What is the Private Cloud?

A

A cloud environment exclusively used by one organization, providing greater control and security.

62
Q

What is the Community Cloud?

A

A cloud environment shared by multiple organizations with similar concerns, like compliance or mission objectives.

63
Q

What is the Hybrid Cloud?

A

A cloud environment that merges public and private clouds to increase flexibility and optimize workloads.

64
Q

What is Multi-Cloud Systems?

A

The use of multiple cloud service providers to enhance performance, avoid lock-in, and boost resilience.

65
Q

What is an Application Programming Interface (APIs)?

A

A set of rules and protocols that enable software applications to interact and share data.

66
Q

What are Microservices?

A

An architectural style where applications are built as a small, independent, and loosely coupled services.

67
Q

What is a Managed Security Service Provider (MSSP)?

A

A third-party provider that remotely managed and monitors an organization’s cybersecurity infrastructure and operations.

68
Q

What are some services an MSSP may offer?

A

Some services may include: 24/7 security monitoring, firewalls, IDS, IPS, Threat Intelligence, Vulnerability Assessments & Penetration Testing, Incident Response, SIEM, Compliance Monitoring, and Endpoint Detection and Response (EDR).

69
Q

What is a Managed Service Provider (MSP)?

A

A third-party company that remotely manages a business’s IT infrastructure, providing services like network management, tech support, updates, and backups.

70
Q

What considerations should an organization take when considering cloud security issues?

A

Availability, resilience, cost, responsiveness, scalability, and segmentation.

71
Q

In regards to cloud computing, what does on-premises mean?

A

IT infrastructure that is physically hosted and managed within an organization’s own location rather than in the cloud.

72
Q

What are the benefits of having a centralized on-premises setup?

A

Easier management, better security control, reduced costs, and simplified backups and recovery.

73
Q

What are the benefits of having a decentralized on-premises setup?

A

Improved local performance, improved resilience, site autonomy, and flexibility.

74
Q

What is a Cloud Access Security Broker (CASB)?

A

Monitors and enforces security policies between cloud users and cloud services.

75
Q

What is a Cloud-based DLP?

A

Designed to detect and block unauthorized sharing or movement of sensitive data in the cloud.

76
Q

What is a Next-Generation Secure Web Gateway (SWG)?

A

A web security tool that inspects traffic for threats, enforces policies, and protects cloud-bound traffic.

77
Q

What are Cloud Firewall Security Groups?

A

Virtual firewalls that control inbound and outbound traffic to cloud resources based on rules.

78
Q

What is Infrastructure as Code (IaC)?

A

Managing and provisioning infrastructure through machine-readable code instead of manual configuration.

79
Q

What is Software-defined Networking (SDNs)?

A

A network architecture that separates the control plane from the data plane and uses a centralized controller for flexible, programmable network management.

80
Q

What is a Software-defined Wide Area Network (SDN-WAN)?

A

WAN architecture that uses software to manage and optimize network traffic across multiple connection types.

81
Q

What is Edge Computing?

A

A computing model where data is processed near the source, reducing latency and improving speed.

82
Q

What is Fog Computing?

A

A decentralized computing model that processes data between edge devices and the cloud, enhancing efficiency.

83
Q

What are mobile devices?

A

Portable computing devices such as smartphones, tablets, and laptops that connect to the Internet via wireless networks.

84
Q

What is a mobile device deployment model?

A

A framework that defines how devices are owned, controlled, and managed in an organization, impacting security and user experience.

85
Q

Explain the Corporate-Owned mobile device deployment model.

A

A device fully owned and controlled by an organization, typically used for work tasks, with all security usage policies enforced by the organization.

86
Q

Explain the Corporate-Owned, Personally Enabled (COPE) mobile device deployment model.

A

A model where the organization owns the device but allows personal use, managing and securing the device while enabling personal applications.

87
Q

Explain the Bring Your Own Device (BYOD) mobile device deployment model.

A

A model where employees use their personal devices for work, with the organization providing security guidelines while employees retain control over the device.

88
Q

Explain the Choose Your Own Device (CYOD) mobile device deployment model.

A

A model where employees select from a list of pre-approved devices provided by the organization, which manages and secure the devices.

89
Q

May you name a few methods mobile devices use to connect to networks and other devices?

A

Cellular, WiFi, and Bluetooth.

90
Q

What is Cellular?

A

Refers to mobile phone networks that enable voice calls, text messaging, and Internet access through base stations in geographic cells.

91
Q

What is Mobile Device Management (MDM)?

A

A security software that allows organizations to monitor, manage,and secure mobile devices, enforce policies, and remotely configure or wipe data.

92
Q

What is Unified Endpoint Management (UEM)?

A

A security solution that allows organizations to manage and secure all types of endpoints (like desktops, mobile devices, and IoT devices) from a single platform, ensuring consistent security and configuration.

93
Q

What are some MDM concepts that apply to mobile devices?

A

Application management, full device encryption, storage segmentation, content management, containerization, passwords/PINs, biometrics, screen locks, remote wipes, geolocation, geofencing, GPS tagging, context-aware authentication, and push notifications.

94
Q

What are Third-party app stores?

A

Unofficial app marketplaces where users can download apps not available in the official stores. They may present security risks due to unverified or malicious software.

95
Q

What is Jailbreaking?

A

The process of removing restrictions on IOS devices to gain full access to the operating system, allowing the installation of unauthorized apps and modifications.

96
Q

What is Rooting?

A

The process of gaining root access to the operating system of Android devices, enabling system modifications and the installation of unauthorized apps.

97
Q

What are Over the Air (OTA) Updates?

A

Software or firmware updates delivered wirelessly to a device, ensuring it receives the latest features and security patches.

98
Q

In regards to mobile devices, what is Custom Firmware?

A

Overwriting the device’s manufacturer firmware with one of your own making or an image made by somebody else.

99
Q

What is Sideloading?

A

The process of manually installing apps or software onto a device from a third-party source instead of the official app store, which may pose security risks.

100
Q

What is an Embedded System?

A

A specialized computer system designed to perform specific tasks within a larger system, often with real-time constraints.

101
Q

What is Internet of Things (IoT)?

A

Refers to a network of interconnected devices that communicate and share data over the Internet, enabling automation and remote control.

102
Q

What is an Industrial Control System (ICS)?

A

A system used to control industrial processes, such as manufacturing, production, and energy distribution, ensuring smooth and safe operations.

103
Q

What is a Supervisory Control and Data Acquisition (SCADA) system?

A

An industrial control system used to monitor and control large-scale processes, such as utilities or manufacturing systems, by collecting real-time data and enabling remote management.

104
Q

What is System-on-chip (SoC)?

A

An integrated circuit that combines essential components like a processor, memory, and input/output interfaces onto a single chip, used in embedded systems and mobile devices.

105
Q

What is Real-time Operating System (RTOS)?

A

An operating system designed to meet the strict timing and reliability requirements of embedded systems, ensuring tasks are completed within specific deadlines.

106
Q

What is the challenge with embedded systems such as ICS, IoT, and SCADA?

A

Security vulnerabilities, limited resources, interoperability issues, real-time processing requirements, and the difficulties of maintaining systems over long lifespans.

107
Q

What are some constraints of embedded systems?

A

Computing power, cryptographic limitations, power, ease of development, cost, and inability to patch/patch availability.