Digital Security Prevention Methods Flashcards
1
Q
Anti-virus & Anti-malware
A
- Anti-malware software runs on the computer
- Each device manages its own protection
-Updates must be completed on all device
- Large organization need Enterprise management
- Track updates , push updates , confirm updates , manage engine updates
-Mobility adds to the challenge
2
Q
Host-Based Firewalls
A
- ‘Personal” firewalls
- Software based
- Included in most operating system
- 3rd-party solutions also available
- Stops unauthorized network access
- “stateful” firewall
- Blocks traffic by application
3
Q
Network-based Firewalls
A
- Filters traffic by port number
- OSI later 4 (TCP / UDP)
- Some firewall can filter through OSI layer 7
- Can encrypt traffic into/out of network
- Can proxy traffic
- Most firewalls can be layer 3 devices (routers)
- Usually sits on the ingress / egress of network
4
Q
Directories Permissions
A
- NTFS permissions
- Much more granular than FAT
- Lock down access
- Prevent accidental modification or deletion
- Some information shouldn’t be seen
- User permissions
- Everyone isn’t an Administrator
- Assign proper rights & permissions
- this may be an involved audit
5
Q
VPN Concentrator
A
- Virtual Private Network
- Encrypt (private) data traversing a public network
- Concentrator
- Encrypt / decryption access device
- Many deployment options
- Specialized cryptographic hardware
- Software - based options available
-Used with client software
6
Q
Data Loss Prvention
A
- Where’s your data
- Social security numbers
- Credit card numbers , medical records
- Stop the data before bad guys do
- So many sources , so many destination
7
Q
Disabling Unused ports
A
- This is good practiced
- Don’t just rely on 802.1X
- Requires additional maintenance
- Also requires constant vigilance
- Plan on periodic reviews
- Easy to do on the switch management console
8
Q
Access Control Lists
A
- ACLs
- Permissions associated with an object
- Used in file systems , network devices , OS, etc
- List the permissions
- Bob can read files
- Fred can access the network
- James can access network 192.168.1.0 / 24 using tcp port 80 , 443 & 8088
9
Q
Smart Card
A
- Must have physical card to provide access
- A digital certificate
- Multiple factors
- Card with PIN or Fingerprint
10
Q
Email Filtering
A
- Unsolicited email / spam
- Stop it at the gateway before it reaches user
- On-site or cloud based
- Scan & block malicious software
- Executables , known vulnerabilities