host and application security solutions Flashcards
A _____is also software located on the host system. It can log and notify admins or users about intrusion attempts without an active response, like denying or blocking.
Host-based Intrusion Detection System (HIDS)
_____ means that all or part of the data in a field is replaced with a randomly generated token or number.
Tokenization
_____ verifies application code has not been modified by the use of digital signatures
Code signing
_____ occur when multiple applications attempt to access the same resource at the same time causing a conflict.
Race conditions
_____ is a dynamic analysis technique that checks code as it is running. When using _____, the system is attacked with random data to check for code vulnerabilities.
Fuzzing - also known as Dynamic analysis
A _____ examines code quality and effectiveness without executing the code
static code analyzer
An analyzer can be used in conjunction with development for continued code quality checks, or once the code is in its finalization stages.
_____ allows the merging of code changes into a central repository. The code is built and tested each time it is checked into the environment, providing a more efficient method to code production.
Continuous integration
_____ attempts to simulate a production environment and focuses on the objective and threshold that an application can handle while maintaining performance.
Stress testing
A trusted, or _____ process uses the trusted platform module (TPM) at each stage in the boot process to check hashes of key system state data, which then uses an attestation process to verify if the system has not been tampered with.
measured boot
An _____ product provides real-time and historical visibility into the compromise, contains the malware, and facilitates remediation of the host to its original state.
endpoint detection and response (EDR)
_____ provide threat detection and prevent those threats based on signature values, heuristic behaviors, and security policies.
Host intrusion prevention systems (HIPS)
_____ is a specification for a software program that connects a computer’s firmware to its operating system
Unified Extensible Firmware Interface (UEFI)
UEFI is the replacement for Basic Input/Output System (BIOS) and has many advancements to include provisions for secure booting.
The _____ is firmware used to manipulate settings on a system. It provides basic instructions on how a system should start up.
Basic Input/Output System (BIOS)
_____ is the process of checking and validating system files during a boot process.
Attestation
A _____ includes both the hardware and software to encrypt data on a drive. Keys are securely stored within for decryption. ___ requires credentials to be entered for decryption.
self-encrypting drive (SED)