Chapter 7 - Host Hardening Flashcards

1
Q

Define a host.

A

A host is any device that has an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is host hardening necessary?

A

Host hardening is necessary because most hosts, when operating by system defaults, are very easy to breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the major categories of hosts?

A

The major categories of hosts are servers, clients (including mobile phones), routers, switches, and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the elements of host hardening?

A

The elements of host hardening are:

  • Back up the host regularly.
  • Restrict physical access to the host.
  • Install the OS with secure configuration options.
  • Minimize the number of applications and OS services running on the host.
  • Harden all remaining applications on the host.
  • Keep patches up to date.
  • Manage users and groups.
  • Manage access permissions for those users and groups.
  • Encrypt data if possible.
  • Add a host firewall.
  • Read OS logs regularly.
  • Run vulnerability tests against the system regularly.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it important to replace default passwords during configuration?

A

It is important to replace default passwords during configuration because default passwords are easy to look up and abuse by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a security baseline, and why is it important?

A

A security baseline is a set of specific actions to be taken to harden hosts of a certain type (windows, OSX, etc) and particular versions within that type.

Security baselines are important because they set a standard baseline to which all units will conform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is the downloading of disk images of the operating system desirable compared to configuring each host individually?

A

Using disk images of the OS as opposed to individual configuration is preferable because it saves money on installation, and ensures that the baselines are met completely with each install.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is virtualization?

A

Virtualization is when multiple operating systems are able to run independently on a single physical machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some of the advantages of virtual machines?

A

There are many benefits from virtual machines. Virtual machines are much faster to set up and configure, as they’re cloned from a server with its own security baseline. This also makes for a more secure environment, and reduces inconsistencies.

It also reduces labor costs, that is, the cost of server admin, development, testing, and training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a systems administrator manage?

A

A systems administrator generally manages a host, or groups of hosts. They’re responsible for hardening systems, and generally do not manage the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the name of Microsoft’s sever operating system? What security protections do recent version of this operating system offer?

A

Microsoft’s server operating system is called Microsoft Windows Server. It provides server software firewalls, encryption, autopatching, and intelligent management of services and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are MMCs?

A

MMCs are Microsoft Management Consoles. These are administrative tools inside Microsoft Windows Server, and are displayed in a common format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is UNIX systems security difficult to describe, generally?

A

UNIX systems security is difficult to describe because of all the different “flavors” of UNIX, each with their own possible issues and concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Distinguish between Linux and UNIX.

A

Linux is the most popular version of UNIX. It runs on ordinary PCs, but has been modified to run in many other places. Linux itself is only the kernel, the individual “flavors” of Linux are the kernel + other programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Linux kernel?

A

The Linux kernel is core of the Linux OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Comment on the cost of Linux.

A

Linux is free, but various distributions may not be. Regardless, Linux is generally cheaper than other OSes, and in some cases, one license will allow for installation on multiple machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Does a particular version of UNIX have a single user interface?

A

Most versions of UNIX have several different user interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are UNIX CLIs called?

A

UNIX CLIs are called shells.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How are CLIs beneficial? Why are they difficult to use?

A

CLIs are beneficial because they use very little in the way of system resources, and can be used to execute scripts of commands. They can be difficult to use because the commands that they run tend to be complex, and syntax-specific, so typos wreck merry hell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a vulnerability?

A

A vulnerability is a security weakness that opens a program to an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an exploit?

A

An exploit is a program that takes advantage of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a zero-day attack?

A

A zero-day attack is an attack that takes place before a vulnerability can be patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the four types of fixes for vulnerabilities?

A

The four types of fixes for vulnerabilities are as follows:

  1. Work-Around: A work-around is a series of manual steps taken by the sysadmin to ameliorate the problem. Labor-intensive, and prone to mistakes.
  2. Patch: A patch is a small program that fixes particular vulnerabilities.
  3. Service Pack: A service pack is a large grouping of vulnerability fixes and system improvements.
  4. Version Upgrade: A version upgrade is like a service pack, but an overhaul of the whole OS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is upgrading to a new version of an OS usually good for security?

A

Upgrading to a newer version of an OS is good for security because, generally, newer versions of OSes have fixes for security vulnerabilities, and older versions of OSes may stop being supported in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why do firms have a difficult time applying patches?

A

Firms have a difficult time applying patches due to several reasons:

  • Number of Patches: There can often be a large volume of patches being rolled out at any time for the machines of a company, and coordinating their installation can be tricky.
  • Cost of Patch Installation: Although patches may be free, the labor needed to find out about them and install them is not.
26
Q

Why do many firms prioritize patches?

A

Many firms prioritize patches because not all patches are created equal; some have to be installed first, based on the likelihood of an attack or breach, or the value of what they are protecting.

27
Q

How do patch management servers help the trouble of keeping patches up-to-date in a firm?

A

Patch management servers learn what software is running on the firm’s machines, and then monitor what patches are needed on an ongoing basis, pushing patches to hosts that need patching. This greatly reduces labor costs.

28
Q

What two risks does patching raise?

A

Patching brings with it two risks:

  1. Increased security can mean reduced functionality.
  2. Not all patches work out-the-door, and can freeze or break machines.
29
Q

What are two reasons why assigning security measures to groups is better than to individuals?

A

Assigning security measures to groups, as opposed to individuals, is less labor-intensive, and is less prone to errors.

30
Q

What privileges does the super user account have?

A

The super user account has complete control over the computer. There are no restrictions.

31
Q

What is brute-force password guessing?

A

Brute-force password guessing is the method of determining a password by trying all possible combinations of characters.

32
Q

Why is it important to not simply use all lowercase letters in passwords?

A

It is important not to use all lowercase letters in a password because it reduces the number of character combinations significantly.

33
Q

What are complex passwords?

A

Complex passwords are passwords that use several different types of keyboard characters.

34
Q

Why is password length important?

A

Password length is important because for every additional digit/character to a password, it increases the time to crack it by a factor of two.

35
Q

What is a dictionary attack? Why are dictionary attacks faster than brute-force attacks?

A

A dictionary attack is where the password to be cracked is compared to a list of common words and phrases, names, etc.

Dictionary attacks are faster than brute-force attacks because they have a far limited list of possibilities to use.

36
Q

What are hybrid dictionary attacks? How are mangling rules applied to lists of dictionary words?

A

Hybrid dictionary attacks are attacks that attempt to try simple modifications of common words contained in a dictionary file. Mangling rules define what modifications are made.

37
Q

What are rainbow tables? How do they reduce the time needed to crack a password?

A

Rainbow tables are large files containing a list of pre-computed password hashes that are indexed. The fact that this list is indexed speeds up the process of cracking incredibly.

38
Q

Can a truly random password be created? Would it be used?

A

It is possible to create a truly random password, but it is unlikely that it would be used, due to the fact that it would be very hard to remember.

39
Q

Should passwords be tested by system administration? Why or why not?

A

Passwords should be tested by systems admin, in order to look for password violations.

40
Q

What do Trojan horse password capture programs do?

A

Trojan horse password capture programs steal passwords through a variety of ways, from keylogging, to presenting false login screens.

41
Q

Does a shoulder surfer need to read the entire password to be successful? Explain.

A

A shoulder surfer could see only a few letters of a password, or figure out the length of the password, which would greatly reduce the amount of time brute-forcing the remaining characters would take.

42
Q

Why is vulnerability testing valuable?

A

Vulnerability testing is like double-checking your security, an attempt to identify flaws in security before attackers do.

43
Q

What two things does vulnerability testing software do?

A

Vulnerability testing software runs a battery of attacks against the system, and then generates a report of the results.

44
Q

Why is it important to get written approval before conducting a vulnerability test?

A

It’s important to get written permission to conduct a vulnerability test, as vulnerability tests are basically identical to real attacks, and jobs might be lost.

45
Q

What can go wrong with anti-virus software?

A

Several things can go wrong with anti-virus software. The user may turn it off, or disable auto-updates, or may not pay the annual fee for it.

46
Q

Why is it important to implement security policy?

A

It is important to implement security policy because, for one, security policies can’t do any good if they’re not implemented. Not to mention that a firm can be held liable for not implementing policies.

47
Q

What is the advantage of implementing the following:

  • Password Policies?
  • Account Policies?
  • Audit Policies?
A

Password policies enforce good password strength, account policies prevent password guessing strategies, and audit policies give logs, which provide evidence in legal cases, gives people the “big brother feeling” to control bad behavior, and allows information gathering on attacks.

48
Q

What are three dangers created by notebook computer loss or theft?

A

The three dangers created by notebook computer loss or theft are:

  • Loss of un-backed-up data
  • Expense of replacing hardware
  • Theft of sensitive data
49
Q

When should backup be done for mobile computers?

A

Any mobile computer should be backed-up before it is taken off-site, and if it is off-site for more than a few hours, it should be backed up frequently while off-site.

50
Q

What four policies are necessary to protect sensitive information on mobile computers?

A

The four policies that are necessary to protect sensitive data on mobile computers are:

  • Limit what sensitive data can be kept on mobile computers.
  • Encryption on all mobile computers is mandatory.
  • Strong passwords on all mobile computers, or biometrics.
  • The first three policies need to be audited.
51
Q

Why is it important to implement security policy?

A

It is important to implement security policy because, for one, security policies can’t do any good if they’re not implemented. Not to mention that a firm can be held liable for not implementing policies.

52
Q

What is the advantage of implementing the following:

  • Password Policies?
  • Account Policies?
  • Audit Policies?
A

Password policies enforce good password strength, account policies prevent password guessing strategies, and audit policies give logs, which provide evidence in legal cases, gives people the “big brother feeling” to control bad behavior, and allows information gathering on attacks.

53
Q

What are three dangers created by notebook computer loss or theft?

A

The three dangers created by notebook computer loss or theft are:

  • Loss of un-backed-up data
  • Expense of replacing hardware
  • Theft of sensitive data
54
Q

When should backup be done for mobile computers?

A

Any mobile computer should be backed-up before it is taken off-site, and if it is off-site for more than a few hours, it should be backed up frequently while off-site.

55
Q

What four policies are necessary to protect sensitive information on mobile computers?

A

The four policies that are necessary to protect sensitive data on mobile computers are:

  • Limit what sensitive data can be kept on mobile computers.
  • Encryption on all mobile computers is mandatory.
  • Strong passwords on all mobile computers, or biometrics.
  • The first three policies need to be audited.
56
Q

Why is central PC security management desirable?

A

Central PC security management is desirable because it allows companies to manage client PCs and allows for automation of that management.

57
Q

Why are standard configurations attractive?

A

Standard configurations, like other presets, simplify troubleshooting and general maintenance by having a controlled and well-documented environment.

58
Q

What does NAC do when a computer attempts to connect to the network?

A

NAC, or Network Access Control, verifies that the client machine complies with security protocols, such as service packs, antivirus presence, etc. Once security “health” has been determined, it is allowed in. If it cannot be verified, it may be allowed to connect to a remediation server, which would allow the client to download updates in order to bring it up to speed. Otherwise, the connection is refused.

59
Q

Does NAC usually stop after access is granted?

A

NAC used to stop after access was granted, but does not any longer; nowadays, NAC looks at traffic after access, looking out for attacks and whatnot.

60
Q

What things can Windows GPOs restrict?

A

Windows Group Policy Objects can restrict practically everything, from control of the desktop to allowing USB devices.