Module 4 - 03-1 Flashcards

Introduction to security hardening

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Security hardening

A

The process of strengthening a system to reduce its vulnerability and attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Attack surface

A

All the potential vulnerabilities that a threat actor could exploit

Let’s use an example that compares a network to a house. The attack surface would be all the doors and windows that a robber could use to gain access to that house. Just like putting locks on all the doors and windows in the house, security hardening involves minimizing the attack surface or potential vulnerabilities and keeping a network as secure as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What devices or systems can Security hardening be conducted on (5)?

A
  • Hardware
  • Operating systems
  • Applications
  • Computer networks
  • Databases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of hardening procedures?

A
  • Software updates, also called Patches
  • Device or application configuration changes
  • Security configuration change - example - requiring longer passwords or more frequent password changes
  • Configuration check - example - updating the encryption standards for data that is stored in a database
  • Removing or disabling unused applications and services
  • Disabling unused ports
  • Reducing access permissions across devices and network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is another name for Software updates?

A

Patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Penetration test

A

A simulated attack that helps identify vulnerabilities in a system, network, website, application, and process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is another name for Penetration test?

A

Pen test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ refers to all the potential vulnerabilities a threat actor could potentially exploit in a system.

  • Penetration testing
  • Configuration testing
  • Attack surface
  • Security hardening
A

Attack surface

An attack surface is all the potential vulnerabilities a threat actor could potentially exploit in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly