"Remember this" Study Guide Notes - Securing Hosts and Data Flashcards
Hardware Security Module (HSM)
A removable or external device that can generate, store, and manage RSA keys used in asymmetric encryption. Many server-based applications use an HSM to protect keys.
Trusted Platform Module (TPM)
A hardware chip on the motherboard included on many newer laptops and it provides full disk encryption. A TPM includes a unique RSA asymmetric key. When a user activates the TPM, it creates a storage root key, which the TPM uses to generate and store other cryptographic keys.
Server Hardening
Hardening a server makes it more secure from its default installation. Disabling unnecessary services and protocols reduces the attack surface of a system and improves its overall security posture.
Baseline Imaging
Standardized images include mandatory security configurations. This ensures systems start in a secure state and reduces overall costs. Administrators are able to identify anomalies by comparing settings, services,
and applications in the image with settings, services, and applications on live computers.
Software Baselines
Host software baselines provide a list of approved software and a list of software installed on systems. Administrators can use this to identify unauthorized software installed on systems. Unauthorized software is not maintained and can easily become vulnerable without patching.
Baseline Reporting
Baseline reporting provides a report after comparing baselines with current systems. Administrators use baseline reporting for security baselines, operating system baselines, application configuration baselines, and software baselines.
Application Whitelisting
Application white-listing identifies authorized software for workstations, servers, and mobile devices. It prevents users from installing or running
software that isn’t on the list.
Server Virtualization
Virtualization allows multiple virtual servers to operate on a single physical server. It provides increased availability with lower operating costs. Additionally, virtualization provides a high level of flexibility when testing security controls, updates, and patches because they can easily be reverted using snapshots.
VLANs
Virtual local area networks (VLANs) separate or segment traffic on physical networks. You can also create VLANs using virtual switches within a virtual environment hosted on a physical server.
Patch Management
Patch management procedures ensure that operating systems and applications are up to date with current patches. This protects systems against known vulnerabilities.
Static Network Environment Controls
Incorporating control redundancy and diversity into security designs is a key method of protecting static environments such as supervisory control and data acquisition (SCADA) systems. Networks holding SCADA systems can be protected using virtual local area networks (VLANs) to segment traffic and network-based intrusion protection systems (NIPS) to block unwanted
traffic.
Mobile Security
Mobile device security includes device encryption to protect the data, screen locks to help prevent unauthorized access, and remote wipe capabilities to delete all data on a lost phone. Radio-frequency identification (RFID) methods are often used for inventory control.
BYOD Security Concerns
Data security is a significant concern related to BYOD policies. You can use VLANs to isolate mobile devices from the primary network, while still granting them access to the Internet.
Mobile Device Management (MDM)
Mobile device management tools help ensure systems are up to date with current patches and have up-to-date antivirus installed. These tools often block devices that are not up to date.
Application Security (Geo-Tagging)
Geo-tagging adds geographical information to files such as pictures when posting them on social media sites. Criminals can exploit this information when watching a specific person.