Hardening Technique 2.5 Flashcards
1
Q
Hardening
A
- Reducing the attack surface area associated with a system reduces the vulnerabilities now and in the future.
2
Q
Security Updates
A
- Always apply updates to the operating system
- Includes operating system update/service packs, security patches.
3
Q
Securing User Accounts
A
- A form of system hardening
- Ensure proper password management
- Give limited access or specific access for certain user accounts.
4
Q
Network Access and Security
A
- An area of system hardening.
- Limit who has access to the system when logging on.
5
Q
Monitor and Secure
A
- Another method for system hardening.
- Using some form of end point detection to secure the system.
- Done through anti-virus and anti-malware.
6
Q
Encryption
A
- A hardening technique.
7
Q
Encrypted File System (EFS)
A
- Security feature of Windows, from Windows 2000 onward.
- Enables the transparent encryption/decryption of the files on the system.
8
Q
Full Disk Encryption (FDE)
A
- Application of encryption to an entire disk.
- Protects all contents in one container.
9
Q
Virtual Private Network (VPN)
A
- Encrypted network connection across another network.
- Offers a private communication channel across a public medium.
10
Q
Endpoint Detection and Response (EDR)
A
- A method of threat point detection
- Scales to meet the increasing number of threats.
- Can perform a root cost analysis of a threat.
11
Q
EDR Response to a Threat
A
- Isolate the system, quarantine the threat, then roll back to a previous config.
- This process can be automated using an API.
12
Q
Host-Based Firewalls
A
- Also known as Personal Firewalls.
- Host-Based protective mechanisms.
- Monitor and control traffic passed in to and out of a single system.
- Stops malware before it can start
- Can be managed by a central system.
13
Q
Host-Based Intrusion Prevention System (HIPS)
A
- Recognizes and blocks known attacks.
- Secures OS and application configs, validate incoming service requests.
- Often built into endpoint protection software.
14
Q
HIPS Identification
A
- Detects malicious actions being performed on the system which can include signatures, heuristics, behavioral.
- Can also monitor how the operating system is working
- Detects buffer overflows, registry updates, or if there are written files to the Windows folder.
15
Q
Open Ports and Services
A
- When installing an outward facing software, ports will be open.
- Attackers will attempt to find these open ports and exploit them.