Mitigation Techniques 2.5 Flashcards
One way to mitigate attacks is to […] any known vulnerabilities.
- System Stability
- Bug Fixes
Patch
One way to mitigate attacks is to protect your data by […] it
Encrypting
One form of encryption where everything on a drive is encrypted is called […]
- BitLocker
Full Disk Encryption (FDE)
[…] is a simple but vital mitigation technique where an administrator can look at sensors, IPS’s, and various types of logs to scan for any suspicious activity
Monitoring
A […] is a collector that consolidates logs to a central location for easy viewing
SIEM (Security Information and Event Manager)
[…] involves doing a posture check every time a device connects to the network, and if it fails, the device is quarantined in a private VLAN
- Is the device up to date?
- Latest patches installed?
- Is antivirus up to date?
Configuration Enforcement
Before a device is thrown away, especially considering hard drives, there should be a […] policy in place to make sure all equipment is properly discarded
Decommissioning