Digital Security Prevention Methods Flashcards

1
Q

Anti-virus & Anti-malware

A
  • Anti-malware software runs on the computer
    • Each device manages its own protection

-Updates must be completed on all device

  • Large organization need Enterprise management
    • Track updates , push updates , confirm updates , manage engine updates

-Mobility adds to the challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Host-Based Firewalls

A
  • ‘Personal” firewalls
    • Software based
  • Included in most operating system
    • 3rd-party solutions also available
  • Stops unauthorized network access
    • “stateful” firewall
    • Blocks traffic by application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network-based Firewalls

A
  • Filters traffic by port number
    • OSI later 4 (TCP / UDP)
    • Some firewall can filter through OSI layer 7
  • Can encrypt traffic into/out of network
  • Can proxy traffic
  • Most firewalls can be layer 3 devices (routers)
    • Usually sits on the ingress / egress of network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Directories Permissions

A
  • NTFS permissions
    • Much more granular than FAT
    • Lock down access
    • Prevent accidental modification or deletion
    • Some information shouldn’t be seen
  • User permissions
    • Everyone isn’t an Administrator
    • Assign proper rights & permissions
    • this may be an involved audit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VPN Concentrator

A
  • Virtual Private Network
    • Encrypt (private) data traversing a public network
  • Concentrator
    • Encrypt / decryption access device
  • Many deployment options
    • Specialized cryptographic hardware
    • Software - based options available

-Used with client software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Loss Prvention

A
  • Where’s your data
    • Social security numbers
    • Credit card numbers , medical records
  • Stop the data before bad guys do
  • So many sources , so many destination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disabling Unused ports

A
  • This is good practiced
    • Don’t just rely on 802.1X
  • Requires additional maintenance
    • Also requires constant vigilance
  • Plan on periodic reviews
    • Easy to do on the switch management console
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access Control Lists

A
  • ACLs
    • Permissions associated with an object
    • Used in file systems , network devices , OS, etc
  • List the permissions
    • Bob can read files
    • Fred can access the network
    • James can access network 192.168.1.0 / 24 using tcp port 80 , 443 & 8088
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Smart Card

A
  • Must have physical card to provide access
    • A digital certificate
  • Multiple factors
    • Card with PIN or Fingerprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Email Filtering

A
  • Unsolicited email / spam
    • Stop it at the gateway before it reaches user
    • On-site or cloud based
  • Scan & block malicious software
    • Executables , known vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly