Chapter 5 Securing Hosts and Data Flashcards
____ is the practice of making an operating system (OS) or application more secure from its default installation.
Hardening
___ helps eliminate vulnerabilities from default configurations, misconfigurations, and weak configurations.
Hardening
Describe least functionality
A core security principle stating that systems should be deployed with the least amount of applications, services, and protocols.
A ____ is an access point to an application or service that bypasses normal security.
Backdoor
True or false: A system or application default account and default password does not need to be changed.
False
Default accounts and default passwords should always be changed.
Windows and Apple operating systems are _____ source software, meaning that the underlying code is not freely available to the public.
Closed
Linux and Unix operating systems are ____ source software, meaning that it is freely available to the public.
Open
Identify three other locations where OSs operate
Kiosks
Network
Appliance
What is a kiosk?
A kiosk is a small structure in an open area used to sell something, provide information, or display advertisements.
To create a non-persistent operating system on a computer you can use a ___
Live boot media
Ex. DISA uses BootMe that authorized DoD users can use to run an operating system on almost any computer.
What is a non-persistent operating system?
One that disappears when users turn off the computer
What is a common method of deploying systems?
Creating a master image with a secure configuration, and then deploy the image to multiple systems.
What is a trusted operating system?
One that meets a set of predetermined requirements with a heavy emphasis on authentication and authorization.
What is the overall goal of a trusted operating system?
To ensure that only authorized personnel can access data based on their permissions. It also prevents any modifications and movement of data by unauthorized entities.
An ____ is a snapshot of a single system that administrators deploy to multiple other systems.
Image
What are two important benefits of imaging?
- It creates a secure starting point.
2. It reduces cost
True or false: You can convert an image to a virtual system
True
A ____ is a known starting point and organizations commonly use them to provide known starting points for systems.
Baseline
True or False: Admins can use an MS security template to import to a GPO and then apply to systems within a domain
True
Some orgs deploy a master image to all systems and then use the security templates to automatically apply different security settings to different groups of systems based on their security needs.
___ security configuration is a common security issue
Weak
True or False: One of the primary benefits of secure baselines is that they improve the overall security posture of systems
True
Identify the three steps for the use of baselines
- Initial baseline configuration
- Integrity measurements for baseline deviation
- Remediation
____ ensures that systems and applications stay up to date with current patches.
Patch management
One of the most efficient ways to reduce operating system and application vulnerabilities is ____ because it protects systems from known vulnerabilities.
Patch management
True or False: Patch management does not include a group of methodologies and processes of identifying, downloading, testing, deploying, and verifying patches.
False
What does SCCM stand for and what is it?
System Center Configuration Manager
It is a systems management tool used for many purposes like patch management
____ defines the process for any type of system modifications or upgrades, including changes to applications.
Change management
What are two key goals of Change Management?
- To ensure changes to IT systems do not result in unintended outages
- To provide an accounting structure or method to document all changes
A common security issue is the use of _______ software, which can cause many different problems.
Unauthorized
The most common problem of using unauthorized software often includes ____
Malware
Aside from malware, additional problems of using unauthorized software are _____ and ____
Application support and license compliance violations
True or False: An organization can be susceptible to fines and penalties if they breach license agreements.
True
______ is a list of applications authorized to run on a system
Application whitelist
____ is a list of applications the system blocks
Application blacklist
____ ______ ______ in MS Group Policy can be used for both whitelisting and blacklisting computers within a domain.
Software Restriction Policies
What does MDM stand for?
Mobile Device Management
True or False: an MDM can whitelist and blacklist applications on mobile devices
True
_______ is the use of an isolated area on a system and it is often used for testing.
Sandboxing
True or False: Sandboxing cannot be used by admins and security professionals to test various security controls before deploying them to a live production network.
False
It can be used to test security controls.
True or False: Virtualized sandboxes are useful for testing patches
True
The ____ command in Linux is used to change the root directory for an application, effectively isolating it.
Chroot
Note: Chroot jail is a term when using chroot to isolate a sandbox in a test directory
List the different types of environments in a secure staging environment
- Development - used by developers to create and modify code
- Test - used by developers to unit test and identify any bugs or errors. Typically does not simulate a full production environment
- Staging - simulates the production environment and is used for late stage testing.
- Production - Final product which includes everything needed to support the application and allow customers and others to use it.
A ____ ____ includes all the elements required to produce a product.
Supply chain
What does EMI stand for and what is it?
Electromagnetic interference
Interference of transmitted signals over wires that comes from sources such as motors, power lines, and fluorescent lights and can prevented from shielding
What does EMP stand for and what is it?
Electromagnetic pulse
A short burst of electromagnetic energy. It can come from a wide assortment of sources and can cause damage to computing equipment
What are some sources of EMP?
- Electrostatic discharge (ESD).
- Lightning
- Military weapons such as nuclear explosions
What does FDE stand for and what is it?
Full disk encryption
When an entire disk is encrypted
What does SED stand for and what is it?
Self-Encrypting Drives
A drive that includes hardware and software to encrypt all data on the drive and securely store the encryption keys
What does BIOS stand for and what is it?
Basic Input/Output System
Firmware which provides a computer with basic instructions on how to start.
What does UEFI stand for and what is it?
Unified Extensible Firmware Interface
Firmware similar to BIOS with enhanced features such as booting from larger disks and designed to be CPU independent
What process upgrades a BIOS or UEFI and how does it work?
Flashing overwrites the software within the BIOS/UEFI chip with newer software
A ____ is a hardware chip on the computer’s motherboard that stores cryptographic keys. It keeps hard drives locked, or sealed, until the system completes a system verification and authentication process.
Trusted Platform Module (TPM)