Hardening Flashcards
Process of configuring workstation or server to only provide essential applications and services
Least Functionality
Only applications that are on the list are allowed to be run by the operating system while all other application are blocked
Application Whitelist
Any application placed on the list will be prevented from running while all other applications are permitted to run.
Application Blacklist
An operating system that meets the requirements set forthby government and has multi level security
Trusted Operating System
A single problem fixing piece of software for an operating system or application
It requires a system reboot.
Patches
Software code for a specific problem addressing a critical, non security bug in the software.
Critical update
A tested accumulative grouping of patches, hotfixes, security updates, critical update and possibly some feature or design changes.
Service pack
Software code that is issued for a product-specific security related vulnerabilty
Security Update
Recommends update to fix a non critical problem that users have found as well as to provde additional features or compatibilities.
Windows update
Updated device driver to fix a security issue or add a feature to a supported piece of hardware
Driver update
A process of planning testing implementing and auditing of software patches.
Patch management
This tool can help identify security misconfigurations within your network’s workstations.
Microsoft baseline security analyser
Step of patching
To verify it is compatible with your system and plan for how you will test and deploy it
Planning
Step of patching
Always test your patch prior to automating its deployment
Testing
Step of patching
Manually or automatically deploy the patch to all your clients to implement it
Deploy
A tool to use to deploy the patch. Large organization centrally manage updates through an update server.
Microsoft system center configuration manager
Step of patching
Is use to ensure the patch was installed properly and there is unexpected failures that have occured because of our installation.
Auditing
A set of rules of policies that can be applied to a set of users or computer accounts within operating system.
Group Policies
Process of measuring changes in the network, hardware software environment.
Helps establish what normal is for your organization you can then identify what abnormal or a deviation looks like.
Baselining
Level of security of a system is affected by its file system type
File system and hard drives
The default file system format for windows and is more secure.
NTFS New Technology File System
Refers to a TCP or UDP number that is configured to accept packets
Open ports
Protects the entire volume and all files on the drive against unauthorized access.
Full Disk Encryption FDE
Is an encryption method, which takes place on the file system level, enabling the encryption of data in individual files and directories.
File-Level Encryption
It is a hard disk drive (hdd) or solid state drive (sdd) with an encryption circuit built into the drive. It transparently encrypts all data written to the media and when unlocked, transparently decrypts all data read from the media.
Self Encrypting Drive SED