Chapter 5 Securing Hosts and Data Flashcards
____ is the practice of making an operating system (OS) or application more secure from its default installation.
Hardening
___ helps eliminate vulnerabilities from default configurations, misconfigurations, and weak configurations.
Hardening
Describe least functionality
A core security principle stating that systems should be deployed with the least amount of applications, services, and protocols.
A ____ is an access point to an application or service that bypasses normal security.
Backdoor
True or false: A system or application default account and default password does not need to be changed.
False
Default accounts and default passwords should always be changed.
Windows and Apple operating systems are _____ source software, meaning that the underlying code is not freely available to the public.
Closed
Linux and Unix operating systems are ____ source software, meaning that it is freely available to the public.
Open
Identify three other locations where OSs operate
Kiosks
Network
Appliance
What is a kiosk?
A kiosk is a small structure in an open area used to sell something, provide information, or display advertisements.
To create a non-persistent operating system on a computer you can use a ___
Live boot media
Ex. DISA uses BootMe that authorized DoD users can use to run an operating system on almost any computer.
What is a non-persistent operating system?
One that disappears when users turn off the computer
What is a common method of deploying systems?
Creating a master image with a secure configuration, and then deploy the image to multiple systems.
What is a trusted operating system?
One that meets a set of predetermined requirements with a heavy emphasis on authentication and authorization.
What is the overall goal of a trusted operating system?
To ensure that only authorized personnel can access data based on their permissions. It also prevents any modifications and movement of data by unauthorized entities.
An ____ is a snapshot of a single system that administrators deploy to multiple other systems.
Image
What are two important benefits of imaging?
- It creates a secure starting point.
2. It reduces cost
True or false: You can convert an image to a virtual system
True
A ____ is a known starting point and organizations commonly use them to provide known starting points for systems.
Baseline
True or False: Admins can use an MS security template to import to a GPO and then apply to systems within a domain
True
Some orgs deploy a master image to all systems and then use the security templates to automatically apply different security settings to different groups of systems based on their security needs.
___ security configuration is a common security issue
Weak
True or False: One of the primary benefits of secure baselines is that they improve the overall security posture of systems
True
Identify the three steps for the use of baselines
- Initial baseline configuration
- Integrity measurements for baseline deviation
- Remediation
____ ensures that systems and applications stay up to date with current patches.
Patch management
One of the most efficient ways to reduce operating system and application vulnerabilities is ____ because it protects systems from known vulnerabilities.
Patch management