GCGA Ch. 5 Securing Hosts and Data Flashcards

1
Q

Virtualization

A

allows multiple servers to operate on a single physical host. It also supports virtual desktops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VDI

A

A virtual desktop infrastructure (VDI) hosts a user’s desktop operating system on a server. Thin clients, including mobile devices, can connect to a server and access a VDI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Container virtualization

A

runs services or applications within isolated containers or application cells. Containers use the kernel of the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VM escape attacks

A

allow an attacker to access the host system from the VM. The primary protection is to keep the host and guests up to date with current patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VM sprawl

A

occurs if personnel within the organization don’t manage the VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Endpoints

A

computing devices such as servers, desktops, laptops, mobile devices, or Internet of Things (IoT) devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EDR

A

Endpoint detection and response (EDR) provides continuous monitoring of endpoints. Extended detection and response (XDR) includes other types of devices and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hardening

A

the practice of making an operating system or application more secure from its default installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Configuration management practices

A

help organizations deploy systems with secure configurations. A master image provides a secure starting point for systems. Master images are typically created with templates or other baselines to provide a secure starting point for systems. Integrity measurement tools detect when a system deviates from the baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Patch management procedures

A

ensure operating systems, applications, and firmware are kept up to date with current patches. This ensures they are protected against known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Change management policies

A

define the process for making changes and help reduce unintended outages from changes. An application allow list identifies authorized software but blocks all other software. An application block list blocks unauthorized software but allows other software to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Full disk encryption (FDE)

A

encrypts an entire disk. A selfencrypting drive (SED) has the encryption circuitry built into the drive.
TPM: A Trusted Platform Module (TPM) is a chip included with many desktops, laptops and some mobile devices, and it supports full disk encryption, a secure boot process, and supports remote attestation. TPMs have an encryption key burned into them and they provide a hardware root of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HSM

A

A hardware security module (HSM) is a removable or external device used for encryption. An HSM generates and stores RSA encryption keys and can be integrated with servers to provide hardware-based encryption. A microSD HSM is a microSD chip with an HSM device installed on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protecting confientiality

A

The primary method of protecting the confidentiality of data is with encryption and strong access controls. File system security includes the use of encryption to encrypt files and folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Database encryption methods

A

You can encrypt individual columns in a database (such as credit card numbers), entire databases, individual files, entire disks, and removable media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLP

A

Data loss prevention (DLP) techniques and technologies help prevent data loss. They can block transfer of data to USB devices and analyze outgoing data via email to detect unauthorized transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data exfiltration

A

the unauthorized transfer of data outside an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cloud computing

A

provides an organization with additional resources. Most cloud services are provided via the Internet or a hosting provider. On-premise clouds are owned and maintained by an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SaaS

A

Software as a Service (SaaS) includes web-based applications such as web-based email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PaaS

A

Platform as a Service (PaaS) provides an easy-to-configure operating system and on-demand computing for customers. The vendor keeps systems up to date with current patches.

21
Q

IaaS

A

Infrastructure as a Service (IaaS) provides hardware resources via the cloud. It can help an organization limit the size of its hardware footprint and reduce personnel costs.

22
Q

MSP

A

A managed service provider (MSP) is a third-party vendor that provides any IT services needed by an organization, including security services. A managed security service provider (MSSP) focuses on providing security services for an organization.

23
Q

CASB

A

A cloud access security broker (CASB) is a software tool or service deployed between an organization’s network and the cloud provider. It monitors all network traffic and can enforce security policies.

24
Q

Private clouds

A

designed for use by a single organization.

25
Third-party cloud vendors
sell access to public cloud services to anyone who wants them.
26
Community clouds
Two or more organizations with shared concerns can share a community cloud.
27
Hybrid cloud
A hybrid cloud is a combination of two or more cloud deployment models. Multi-cloud systems combine the resources from two or more cloud service providers. Cloud-based DLP systems can enforce security policies for any data stored in the cloud.
28
Next-generation secure web gateway
provides proxy services for traffic from clients to Internet sites. It can filter URLs and scan for malware.
29
Common cloud security considerations
include availability, resilience, cost, responsiveness, scalability, and segmentation.
30
On-premises vs off-premises deployments
may be created using a centralized approach, with a small number of physical locations, or a decentralized approach, with many physical locations. Off-premises solutions make use of cloud service providers.
31
IaC
Infrastructure as code (IaC) refers to managing and provisioning data centers with code to define VMs and virtual networks.
32
SDN
Software-defined networks (SDN) use virtualization technologies to route traffic instead of using hardware routers and switches.
33
COPE
Corporate-owned, personally enabled (COPE) mobile devices are owned by the organization, but employees can use them for personal reasons.
34
BYOD vs CYOD
Bring your own device (BYOD) policies allow employees to connect their mobile devices to the organization’s network. Choose your own device (CYOD) policies include a list of acceptable devices and allow employees who own one of these devices to connect them to the network.
35
VDI
A virtual desktop infrastructure (VDI) is a virtual desktop, and these can be created so that users can access them from a mobile device.
36
MDM
Mobile device management (MDM) tools help ensure that devices meet minimum security requirements. They can monitor devices, enforce security policies, and block network access if devices do not meet these requirements. MDM tools can restrict applications on devices, segment and encrypt data, enforce strong authentication methods, and implement security methods such as screen locks and remote wipe. Containerization is useful when using the BYOD model.
37
Screen lock
like a password-protected screen saver on desktop systems that automatically locks the device after some time.
38
Remote wipe signal
removes all the data from a lost phone.
39
Geolocation
uses Global Positioning System (GPS) to identify a device’s location. Geofencing uses GPS to create a virtual fence or geographic boundary. Organizations use geofencing to enable access to services or devices within the boundary and block access outside the boundary.
40
Geotagging
uses GPS to add geographical information to files (such as pictures) when posting them on social media sites.
41
Third-party app store
something other than the primary store for a mobile device. Apple’s App Store is the primary store for Apple devices. Google Play is a primary store for Android devices.
42
Jailbreaking
removes all software restrictions on Apple devices, and rooting provides users with root-level access to an Android device. Custom firmware can also root an Android device. MDM tools block network access for jailbroken or rooted devices.
43
Sideloading
the process of copying an application to an Android device instead of installing it from an online store. Tethering allows one mobile device to share its Internet connection with other devices. Wi-Fi Direct allows you to connect devices together without a wireless router.
44
Embedded system
any device that has a dedicated function and uses a computer system to perform that function. A security challenge with embedded systems is keeping them up to date.Embedded systems include smart devices sometimes called the Internet of Things (IoT), such as wearable technology and home automation devices.
45
IoT
Internet of Things (IoT) devices interact with the physical world. They commonly have embedded systems and typically communicate via the Internet, Bluetooth, or other wireless technologies.
46
SCADA & ICS
A supervisory control and data acquisition (SCADA) system controls an industrial control system (ICS). The ICS is used in large facilities such as power plants or water treatment facilities. SCADA and ICS systems are typically in isolated networks without access to the Internet and are often protected by network intrusion prevention systems.
47
SoC
A system on a chip (SoC) is an integrated circuit that includes a full computing system.
48
RTOS
A real-time operating system (RTOS) is an operating system that reacts to input within a specific time.
49
Constraints of embedded systems
The major constraints associated with embedded systems include computing limitations, cryptographic limitations, power limitations, ease of deployment, cost and the inability to patch/patch availability.