Secure Operating Environments - OS Hardening Flashcards

1
Q

what are the top four strategies to prevent cyber intrusions ?

A
  • White-list approved applications
  • Patch third-party applications and OS vulnerabilities
  • Restrict administrative privileges
  • Create a defense-in-depth system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a secure Base OS ?

A
  • Installed and patched
  • Hardened and correctly configured
  • Test security of basic OS to ensure that steps taken adequately address its security needs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can we harden an OS ?

A
  • Removing unnecessary services, applications, protocols
  • Configuring users, groups, and permissions
  • Configuring resource controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are additional security controls that can be added to harden an OS ?

A

antivirus, host-based firewalls, and intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why do we need to configure our OS ?

A

Default configuration might not be secure:
- Default configuration set to maximize ease of use and
functionality rather than security
- Additional packages can later be installed if required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do we need an System planning process for our OS ?

A

System planning process should identify what is required for a given system. -> less Software on the machine -> less risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How should we restrict elevated privileges ?

A

Elevated privileges should be restricted to those users that require them, and only when needed to perform a task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should we consider in the System planning process concerning users, groups and permissions ?

A
  • Categories of users on the system
  • Privileges they have
  • Types of information they can access
  • How and where access control configuration is set
How well did you know this?
1
Not at all
2
3
4
5
Perfectly