Section 4: Security Applications and Devices Flashcards
What is the BIOS?
The Basic Input Output System (BIOS) is a type of firmware that is software on a chip. The systems way of deciding what it is going to accept as input and output.
For example: A motherboard talking to keyboard, graphics card, etc.
This is a legacy system, newer systems use UEFI
What is the BIOS/UEFI load Order?
- Boot drive or device
- Load the machine
- Operating System
5 steps of Securing the BIOS/UEFI?
- Flash/Update
- Password Protect
- Boot Order (Internal HDD and Network only)
- Disable External Ports not in use
- Enable Secure Boot
How does Secure Boot work?
Secure Boot loads the public key from the trusted platform module (TPM) in the processor and verifies it with the operating system to ensure it has not been modified.
What are Removable Media Controls? How can they be implemented?
Removable Media Controls are technical limitations placed on a system in regards to the utilization of usb storage devices.
They can be implemented by group policies such as blocking read or write access from usb or disk drive.
Administrative controls would be polices put in place as to how these devices are used.
What is a NAS storage system?
Network Attached Storage (NAS) is a storage device directly attached to an organizations network. Usually in RAID array for high availability.
What is a SAN storage system?
Storage Area Network (SAN) is a network designed specifically to perform block storage functions that may consist of NAS devices.
How to secure Storage Devices? 3 steps?
- Data Encryption
- Proper Individual Level Authentication
- Log access
What is Encryption?
Encryption is the process of scrambling data into unreadable information that can only be unscrambled with a key
What is Hardware Based Encryption and one example?
Hardware based encryption is the use of hardware to encrypt data on a system.
One example is a Self Encrypting Drive (SED)
What is an SED for data?
Self Encrypting Drive (SED) is a storage device that performs whole disk encryption by using embedded hardware.
What is Software Based encryption and two examples of it?
Software based encryption is an encryption process that uses the computers resources to encrypt information.
Two example are: FileVault on MacOS and BitLocker on Windows.
What is AES?
Advanced Encryption Standard (AES) is the symmetric key encryption that support 128-bit and 256-bit keys.
considered unbreakable
What is the downside of Whole Disk encryption?
Lower performance
Unless there are HSMs
What is an HSM? Why are they not common?
Hardware Security Module (HSM) is a physical device that acts as a secure crypto-processor during the encryption process/Digital Singing.
They are not common because they are very expensive.