Managing Security 3 Flashcards
Describe defense in depth
A tactic that leverages a layered approach to security used to plan personnel training, policy adoption, physical protection and other comprehensive strategies. An excellent fail safe.
Describe layered security
securing systems and their data that incorporates many different venues of defense and implementing controls to mitigate each type of threat. Provides optimum protection for organization vulnerable to a wide variety of attacks
What is data security
Refers to the security controls and measure taken to keep an organizations data safe and accessible and prevent unauthorized access. Must be applied at every level.
Describe data security vulnerabilities.
Can include the increased use of cloud computing, lack of restricted physical access to data storage systems, and lack of user awareness.
List some data storage methods
Traditional network servers. Referred to DAS direct attach storage
Network attached storage NAS. multiple hard dives
Storage area networks SAN dedicated networks providing block level storage
Cloud based storage. Service based storage hosted by a third party
Name the data encryption methods
Full disk encryption Database encryption File encryption Mobile device encryption Email encryption Voice encryption
Explain hardware based encryption devices
Encryption, decryption, and access control are enforced by a cryptographic module called HSM. hardware security module. Does not allow the execution of external programs attempting to reset counters or access their memory
Benefits of hardware based encryption
Prevents storage mapping from drive to file system
Prevents copying drive contents without the assigned HSM
self governed and not dependent on the OS
provides org proof that each machine is encrypted.
List the types of hardware based encryption devices
TPM trusted platform module
HSM hardware security module
USB encryption
Hard drive encryption
Trusted platform module TPM is
Hardware based encryption that can generate cryptographic keys securely and used to authenticate hardware for disc encryption and other encryption enabled application. Uses crypto processor to secure computing environment.
HSM
Hardware Security Module
A cryptoprocessor device attached to severs and computers to provide digital key security
USB encryption
Hardware based encryption implemented on USB devices
Hard drive encryption
Hardware based encryption that is a full disk encryption method used to encrypt and protect data on the entire disk. Effective on mobile devices.
List the three data states
At rest. Refers to data in storage
In transit. Refers to data moving across a network
In use. Data being generated, changed, erased or viewed at one network node.
ACLs enable you to
Access Control Lists enable you to restrict access to resources. commonly implemented as MAC address filters on wireless routers and access points
Big data refers to
Data collections so large and complex traditional database tools find it difficult to manage. Generally restrict authorized users visibility from seeing the data as a whole. Design to work only with trusted parties and integrate non repudiation
Data policies might be created for
Wiping data
Disposing of data
Retention types of data to be retained
Storage
What is application security
Ensures that the proper software is in place to protect applications from threat and vulnerabilities.
Applied to every phase of the software development process.
Patch management is
The practice of monitoring for, obtaining, evaluating, testing, and deploying software patches and updates.
List common application security methods.
Configuration baseline. Composed of the minimum security requirements needed for an application to be completed.
Application hardening. Used to configure default application to prevent security threats and vulnerabilities.
Patch management. System for third party software to ensure ever app is running the latest security requirements and updates
What is input validation
Involves ensuring that the data entered into a field in an application is within acceptable bounds for the object that will receive the data.
What is command injection
An attacker sends additional commands to an application through an unchecked input field
Exploits input validation vulnerabilities