- Device Hardening Flashcards

1
Q

Changing default credentials

A

Changing default credentials
• Most devices have default usernames
and passwords
• Change yours!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Avoid common passwords

A

Avoid common passwords
• People use common words as passwords
• You can find them in the dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Upgrading firmware

A

Upgrading firmware
• Many network devices do not use
a traditional operating system
• All updates are made to firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

File hashing

A

File hashing
• Hashing represents data as a short string of text
• A message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disabling unnecessary services

A

Disabling unnecessary services
• Every service has the potential for trouble
• The worst vulnerabilities are 0-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Watching the network

A

Watching the network
• There’s a wealth of information in the packets
• Some of it is very sensitive informatio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure protocols

A

Secure protocols
• SSH - Secure Shell
• Terminal sessions; use instead of Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Generating new keys

A

Generating new keys
• We communicate to network devices
over encrypted channels
• HTTPS, SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disabling unused TCP and UDP ports

A

Disabling unused TCP and UDP ports
• Control traffic based on data within the content
• Data in the packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disabling unused interfaces

A

Disabling unused interfaces
• Enabled physical ports
• Conference rooms
• Break rooms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Restricting access via ACLs

A

Restricting access via ACLs
• Use device ACLs to limit access to important
infrastructure devices
• Only admins should be able to login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Honeypots

A

Honeypots

• Attract the bad guys - and trap them there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Penetration testing

A

Penetration testing
• Pentest
• Simulate an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly