Hardening Targets 4.1 Flashcards
1
Q
Hardening
A
- Protecting the information in the system
- Keeping other services and users off the system to further improve security
- Change the default settings of an operating system
2
Q
Hardening Guides
A
- Are specific to the software or platform to help maintain security and safety.
3
Q
Hardening of Mobile Devices
A
- Manufactures provided hardening checklists to secure a personal device.
- Updates provided bug fixes and security patches
4
Q
Mobile Device Manager (MDM)
A
- Assists in managing a large group of mobile devices
- Monitors these devices and pushes security updates.
5
Q
Hardening of Workstations
A
- These include user desktops and laptops
- Constant monitoring and updates are performed with patches released on a specific timeframe
6
Q
Hardening of the Networking
A
- Always change the default credentials
- Can check with manufacturer for security updates
7
Q
Hardening of Cloud Infrastructure
A
- Secure the cloud management workstation
- Establish least privilege for software and users to have the minimum permission and rights to perform their specific functions
8
Q
Configure Endpoint Detection and Response (EDR)
A
- Monitor the Cloud for any potential attacks
- Ensure the Cloud is up-to-date with latest antimalware technologies.
9
Q
Cloud to Cloud (C2C)
A
- Cloud infrastructures are prone to outages
- Backing up the Cloud to another Cloud based service.
10
Q
Supervisory Control and Data Acquisition System (SCADA)
A
- Used for large-scale/multi-site Industrial Control Systems (ICS)
- PC manages equipment such as the ICS
- Separated from other systems on the network by an air gap and has limited access
11
Q
Embedded Systems
A
- Hardware and software designed for a specific function or to operate as part of a larger system.
- Typically seen within devices such as smart watches
12
Q
Considerations for Embedded Systems
A
- Can be difficult to upgrade
- If a security patch becomes available, this must installed as soon as possible to remove potential threats
13
Q
Addressing Security Issues for Embedded Systems
A
- Consider placing the embedded system in a separate system with a firewall
- Prevents access from unauthorized users
14
Q
Real Time Operating System (RTOS)
A
- An operating system with a deterministic processing schedule or a set schedule for each process to occur.
15
Q
Consideration for RTOS
A
- This system should be isolated to prevent access from other systems.
- Run with minimum services to prevent potential exploits
- Use secure communication