Securing Hosts And Data Flashcards
Principle that states systems should be deployed with only the application, services, and protocols they need to meet their purpose
Least Functionality
A type of OS that disappears when users turn off the computer
Non-persistent operating system
A type of OS that meets predetermined requirements with a heavy emphasis on authentication and authorization
Trusted Operating System
The two important benefits that imaging provides
- Secure Starting Point
- Reduced Costs
These two strategies include automation, scripting, and templates to help deploy systems securely, and keep them in a secure state
Resiliency and automation strategies
The three steps in baseline configuration
- Initial baseline configuration
- Integrity measurements for baseline deviation
- Remediation
This ensures that systems and applications stay up to date with current updates
Patch Management. Usually combined with NAC technologies to identified unpatched devices.
The process used to control changes and modifications done on systems and applications.
Change Management
Process used to protect hosts to include mobile devices, workstations, and servers from unauthorized applications
Whitelisting & Blacklisting
This technique refers to using an isolated area on a system to test software.
Sandboxing
Linux - chroot command or chroot jail
The secure staging environments used to create software
Development
Test
Staging
Production
These are associated with embedded systems and often have internal storage that might retain documents that they process.
Multi-Function Devices (MFD)
The difference between EMI and EMP
EMI - Electronic Magnetic Interference. Associated with powerlines, microwaves, motors
EMP - Electronic Magnetic Pulse. Associated with Military tech, ESD, and lightning
The difference between FDE and SED
Full Disk Encryption - Encrypts entire disk
Self Encrypting Device - Includes hardware and software to provide encryption to a drive.
The difference between BIOS and UEFI
BIOS - referred as firmware.
UEFI - Does the same as BIOS but it can boot from larger disk and its CPU-independent.
This is a hardware chip on the computer’s motherboard that stores cryptographic keys used for encryption.
TPM - Trusted Platform Module. Supports Secure Boot & Attestation. Provides a hardware root of trust or known secure starting point
This is similar to a TPM but it is added to a system to manage and securely store cryptographic keys
HSM - Hardware Security Module