Hardening Techniques 2.5 Flashcards
To keep and OS hardened, all […] should be installed
- Security patches
- Service Packs
Updates
To harden user accounts, you should have a […] in place that enforces minimum length and complexity
Password Policy
To protect your data as it travels across the network, you should use a […] to encrypt traffic
VPN
A new type of antivirus, called a […], doesn’t just use signatures as a detection tool, but also uses behavior analysis, machine learning, and process monitoring.
It can also respond to a threat without user intervention
- Isolate the system
- Quarantine threat
- Roll back to previous configuration
Endpoint Detection and Response (EDR)
A software based firewall that runs on a device is called a […] firewall
It allows or disallows incoming or outgoing application traffic
Host Based
Often built into the EDR / Anti Malware, a […] recognizes and blocks known attacks as they happen.
Host Based Intrusion Prevention System (HIPS)
[…] leave possible entry points into your network, and should be closed unless required.
Control access with a firewall
Open ports and services
Use the command […] to scan for any open ports on a system
nmap
Any new equipment should have its […] when first logging into it.
Default password changed