Domain 4 : Given a scenario, apply common security techniques to computing resources Flashcards
Secure Baseline
A security baseline is the foundational set of security configurations and practices that establish a secure starting point for computing resources
Implemented secure baselines offer a reliable starting point from which to harden targets against potential vulnerabilities
Center for Internet Security (CIS) Benchmark
: CIS benchmarks are comprehensive, community-driven guides meticulously crafted to establish secure configurations for various computing resources. IT
Security Technical Implementation Guide (STIG
STIG is a comprehensive repository of cybersecurity guidelines and best practices curated by the United States Department of Defense (DoD). Its primary mission is to enhance the security posture of DoD information systems and networks. Implementing STIG recommendations involves a systematic approach whereby organizations assess their systems and networks against the guidelines, identify vulnerabilities or areas of non-compliance, and take remedial actions to align with the prescribed security configurations.This iterative process not only fortifies defenses but also ensures continuous monitoring and adaptation to evolving threats.
Microsoft Group Policy
Microsoft Group Policy is an indispensable tool for organizations that predominantly rely on Windows operating systems. It allows administrators to define and enforce security configurations across a network of Windows devices. With Group Policy, a set of predefined security baselines can be created and applied uniformly to all Windows systems within an organization.
How to deploy baslines
Two powerful tools for implementing these baselines are Microsoft Group Policy and Puppet Forge
Puppet Forge
Puppet Forge is a versatile platform-agnostic solution. It provides a repository of pre-built modules and configurations that can be used to deploy security baselines across a range of operating systems, including Windows, Linux, and macOS.
SCAP(Security Content Automation Protocol)
The Security Content Automation Protocol (SCAP) is a standardized framework for maintaining system security. SCAP Compliance Checker operates by comparing a system’s security settings against a predefined checklist of security requirements.
CIS Configuration Assessment Tool
(CIS-CAT): CIS-CAT is a configuration assessment tool designed to evaluate systems and applications against CIS benchmarks, which are curated by the Center for Internet Security (CIS)
Site Survey
Conducting site surveys is an essential step in optimizing wireless network performance. These surveys involve a comprehensive analysis of the environment, which includes identification of sources of interference, such as load-bearing walls, cordless phones, microwaves, elevators, metal frames, metal doors, and radio waves. A site survey will help to determine the best places to install the wireless access points that users connect to.
Heat Map
A heat map is a valuable tool in the hands of a network administrator when addressing reports of inadequate coverage
corporate-Owned, Personally Enabled (COPE):
: In this model, organizations provide employees with corporate-owned devices that can be used for both business and personal use but must comply with company policies
Choose Your Own Device (CYOD)
CYOD is a policy in which the company provides employees with a selection of approved devices to choose from. These devices are owned and managed by the organization. This
WPS
WPS allows you to connect to a wireless network by simply pushing a button, negating the need to insert a password each time.
Pre-Shared Key (PSK):
PSK refers to a passphrase or a pre-shared secret key that is used to authenticate and secure access to a wireless network. Any time you visit a restaurant and ask the host for the wireless password, the password they provide is the PSK. Remember there is also an admin password on the WAP that you should never share.
Evil Twin
: In an evil twin attack, the attacker uses either the same or a similar SSID to the victim. The telltale signs of this attack are a slower internet connection and the inability to access corporate data. This error occurs because you are actually on the wrong wireless network—one created by the attacker.
Captive portal
captive portal can be used to control access to a WAP. For example, when you join the wireless network at the airport, you are connected to the free Wi-Fi, yet you cannot access the internet right away. It redirects you to a captive portal so that you can provide additional validation of who you are, normally through an email address or your Facebook or Google account information.
Bluetooth Low Energy (BLE)
BLE prioritizes energy efficiency and uses random-generated device addresses to prevent tracking and identification. This makes it the first choice for a wide range of applications where conserving battery life is critical.
Bluejacking
Bluejacking is a type of attack in which individuals send unsolicited messages or business cards to nearby Bluetooth-enabled devices, such as smartphones or laptops
Cellular Networks
Cellular networks (the latest versions of which are 4G and 5G) are responsible for providing mobile voice and data services over large geographical areas. They rely on a network of cell towers and satellites to connect mobile devices to the internet and each other.
NFC
NFC is another technology that leverages cellular connections. NFC allows devices to communicate when they are in close proximity, typically within a few centimeters. This technology is the foundation of contactless payment systems such as Apple Pay and Google Wallet