Lesson 12 - Implementing Host Security Solutions Flashcards

1
Q

A cryptographic module embedded within a computer system that can endorse trusted execution and attest to boot settings and metrics.

A

hardware Root of Trust (RoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information.

A

trusted platform module (TPM)
Each TPM is hard-coded with a unique, unchangeable asymmetric private key called the endorsement key. This endorsement key is used to create various other types of subkeys used in key storage, signature, and encryption operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of system firmware providing support for 64-bit CPU operation at boot, full GUI and mouse operation at boot, and better boot security.

A

unified extensible firmware interface (UEFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A UEFI feature that prevents unwanted processes from executing during the boot operation.

A

Secure boot
Secure boot requires UEFI, but does not require a TPM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A UEFI feature that gathers secure metrics to validate the boot process in an attestation report.

A

Measured Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Report of boot state integrity data that is signed by a tamper-proof TPM key and reported to a network server.

A

Boot Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption of all data on a disk (including system files, temporary files, and the pagefile) can be accomplished via a supported OS, thirdparty software, or at the controller level by the disk device itself.

A

Full disk encryption (FDE)
Disk encryption can be applied to both hard disk drives (HDDs) and solid state drives (SSDs).
FDE requires the secure storage of the key used to encrypt the drive contents.
One of the drawbacks of FDE is that, because the OS performs the cryptographic operations, performance is reduced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A disk drive where the controller can automatically encrypt data that is written to it.

A

Self-Encrypting Drives (SED)
the cryptographic operations are performed by the drive controller. The SED uses a symmetric data/media encryption key (DEK/MEK) for bulk encryption and stores the DEK securely by encrypting it with an asymmetric key pair called either the authentication key (AK) or key encryption key (KEK). Use of the AK is authenticated by the user password. This means that the user password can be changed without having to decrypt and re-encrypt the drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In storage encryption, the private key that is used to encrypt the symmetric bulk media encryption key (MEK). This means that a user must authenticate to decrypt the MEK and access the media.

A

Key Encryption Key (KEK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Standards for implementing device encryption on storage devices.

A

Opal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Product life cycle phase where sales are discontinued and support options reduced over time.

A

End of Life (EOL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Product life cycle phase where support is no longer available from the vendor.

A

End of Service Life (EOSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Usually a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve the exchange of money.

A

Memorandum of understanding (MOU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Agreement by two companies to work together closely, such as the partner agreements that large IT companies set up with resellers and solution providers.

A

Business partnership agreement (BPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Legal basis for protecting information assets.

A

Nondisclosure agreement (NDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Operating procedures and standards for a service contract.

A

Service level agreement (SLA)
A contractual agreement setting out the detailed terms under which a service is provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Evaluates the data collection and statistical methods used by a quality management process to ensure they are robust.

A

Measurement systems analysis (MSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The process of making a host or app configuration secure by reducing its attack surface, through running only necessary services, installing monitoring software to protect against malware and intrusions, and establishing a maintenance schedule to ensure the system is patched to be secure against software exploits.

A

hardening
bastian system*

19
Q

A small unit of supplemental code meant to address either a security problem or a functionality flaw in a software package or operating system.

A

patches

20
Q

Identifying, testing, and deploying OS and application updates. Patches are often classified as critical, security-critical, recommended, and optional.

A

patch management

21
Q

A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.

A

Endpoint Detection and Response (EDR)

22
Q

A computer system that is designed to perform a specific, dedicated function, such as a microcontroller in a medical drip or components in a control system managing a water treatment plant.

A

Embedded System

23
Q

A type of computer designed for deployment in an industrial or outdoor setting that can automate and monitor mechanical systems.

A

programmable logic controller (PLC).

24
Q

A processor that integrates the platform functionality of multiple logical controllers onto a single chip.

A

System on chip (SoC)
This type of packaging saves space and is usually power efficient, and so is very commonly used with embedded systems.

25
Q

Open-source platform producing progammable circuit boards for education and industrial prototyping.

A

Raspberry Pi

26
Q

Open-source platform producing progammable circuit boards for education and industrial prototyping.

A

Arduino

27
Q

A processor that can be programmed to perform a specific function by a customer rather than at the time of manufacture.

A

Field Programmable Gate Array (FPGA)

28
Q

A type of OS that prioritizes deterministic execution of operations to ensure consistent response for time-critical tasks.

A

Real-Time Operating Systems (RTOS)

29
Q

The chip and firmware in a smartphone that acts as a cellular modem.

A

Baseband Radio
Cellular Networks

30
Q

A small chip card that identifies the user and phone number of a mobile device, via an International Mobile Subscriber Identity (ISMI).

A

subscriber identity module (SIM)

31
Q

Low-power wireless communications protocol used primarily for home automation. Z-Wave uses radio frequencies in the high 800 to low 900 MHz and a mesh topology.

A

Z-Wave
Z-Wave uses ~900 Mhz frequencies.

32
Q

Low-power wireless communications open source protocol used primarily for home automation. ZigBee uses radio frequencies in the 2.4 GHz band and a mesh topology.

A

Zigbee
Zigbee uses the 2.4 GHz frequency band.

33
Q

A network managing embedded devices (computer systems that are designed to perform a specific, dedicated function).

A

Industrial Control Systems (ICSs)

34
Q

Input and output controls on a PLC to allow a user to configure and monitor the system.

A

Human-Machine Interfaces (HMIs)

35
Q

Software that aggregates and catalogs data from multiple sources within an industrial control system.

A

Data Historian

36
Q

A type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographically large areas.

A

Supervisory Control and Data Acquisition (SCADA)

37
Q

Devices that can report state and configuration data and be remotely managed over IP networks.

A

Internet of Things (IoT)

38
Q

Components and protocols that facilitate the centralized configuration and monitoring of mechanical and electrical systems within offices and data centers.

A

Building Automation System (BAS)

39
Q

A utility meter that can submit readings to the supplier without user intervention.

A

Smart Meters

40
Q

a network of monitored locks, intruder alarms, and video surveillance.

A

Physical Access Control System (PACS)

41
Q

A physical security control that uses cameras and recording devices to visually monitor the activity in a certain area.

A

Video Surveillance

42
Q

Any device that performs more than one function, but typically print devices that can also scan and fax.

A

Multifunction Printers (MFPs)

43
Q

A serial network designed to allow communications between embedded programmable logic controllers.

A

CAN bus
controller area network (CAN).