Hardening Targets 4.1 Flashcards

1
Q

Hardening

A
  • Protecting the information in the system
  • Keeping other services and users off the system to further improve security
  • Change the default settings of an operating system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hardening Guides

A
  • Are specific to the software or platform to help maintain security and safety.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardening of Mobile Devices

A
  • Manufactures provided hardening checklists to secure a personal device.
  • Updates provided bug fixes and security patches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mobile Device Manager (MDM)

A
  • Assists in managing a large group of mobile devices
  • Monitors these devices and pushes security updates.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardening of Workstations

A
  • These include user desktops and laptops
  • Constant monitoring and updates are performed with patches released on a specific timeframe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardening of the Networking

A
  • Always change the default credentials
  • Can check with manufacturer for security updates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hardening of Cloud Infrastructure

A
  • Secure the cloud management workstation
  • Establish least privilege for software and users to have the minimum permission and rights to perform their specific functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Configure Endpoint Detection and Response (EDR)

A
  • Monitor the Cloud for any potential attacks
  • Ensure the Cloud is up-to-date with latest antimalware technologies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud to Cloud (C2C)

A
  • Cloud infrastructures are prone to outages
  • Backing up the Cloud to another Cloud based service.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Supervisory Control and Data Acquisition System (SCADA)

A
  • Used for large-scale/multi-site Industrial Control Systems (ICS)
  • PC manages equipment such as the ICS
  • Separated from other systems on the network by an air gap and has limited access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Embedded Systems

A
  • Hardware and software designed for a specific function or to operate as part of a larger system.
  • Typically seen within devices such as smart watches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Considerations for Embedded Systems

A
  • Can be difficult to upgrade
  • If a security patch becomes available, this must installed as soon as possible to remove potential threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Addressing Security Issues for Embedded Systems

A
  • Consider placing the embedded system in a separate system with a firewall
  • Prevents access from unauthorized users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Real Time Operating System (RTOS)

A
  • An operating system with a deterministic processing schedule or a set schedule for each process to occur.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consideration for RTOS

A
  • This system should be isolated to prevent access from other systems.
  • Run with minimum services to prevent potential exploits
  • Use secure communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internet of Things (IoT) Devices

A
  • Devices that manage systems using automation such as wearable technology, home automation, etc.,
17
Q

Security Considerations for IoT

A
  • Weak defaults as manufacturers are not security experts
  • Security patches must be placed at the highest priority and should be deployed as soon as possible
  • Devices should be placed on their own network using VLAN