Securing Individual Systems Part 2 Flashcards
This is also known as media sanitation…
Data Destruction
How are monitors vulnerable?
They have USB slots that could be used to get into system
ACL
Access Control List
RATs
-Trojan that doesn’t do anything bad until someone tells it to remotely
Remote Access Trojans
Virus that’s designed to make itself hard to find
Armored Virus
Type of secure operating system?
- Windows Server
- built in funtionality
- more connections
Server OS
WPS
Press a button on your printer and then on your computer and you’re connected via WPA-2 encryption
Type of secure operating system?
-Desktop versions
Workstation
SED
-TPM built into drive
Self Encrypting Drive
EMI
Electromagnetic Interference
True or False
-Host-based firewalls are set up as implicit deny by default
True
What is a Rubber Ducky?
USB stick that you’re computer sees as a keyboard, but is actually a hacking tool that can run scripts and such
Developer could write this into software for good or bad reasons
Backdoor
Clearing
Can be done with commands such as erase, format, and delete - these methods are not final
Type of secure operating system?
- Apple
- Android
Mobile OS
IDS
-Can help detect threats to the host
Intrusion Detection System
Type of secure operating system?
- limited functions
- usually linux based
Kiosk
Programs that try to put ads up
Adware
Clustering
More than one computer doing the same job
Bluetooth has how many classes?
Class 1 - 328’
Class 2 - 33’ distance (most popular for phone/headphones)
Class 3 - 3’
Used in smart phones and cars to ensure security on these embedded systems…
Secure Boot
Where can you disable ports?
In the bios
FDE
Full Disk Encryption
What does an ISCSI Initiator do?
Finds the SAN drives
HSM
-Handles all digital signatures - web servers are an example of who would use this
Hardware Security Module
Blue-Snarfing
Connecting to someones bluetooth without permission to steal data
IDS
- Inside the network
- Watches within the network traffic
- Sends alerts on suspicious activity
Intrusion Detection Software
Purging
Will process the device to remove data from the drive - the device will no longer be usable
Ex: magnet machine
DEP
-Keeps people from running code through system memory reserved locations
Data Execution Prevention
Piece of software that attaches to other files, propagates, and spreads to other devices, and then eventually activates
Virus
Software you don’t want on your computer - it may or may not be bad
Malware
Malware that changes itself enough to confuse virus detection
Polymorphic Malware
Similar to RATs - are triggered by an event and not someone remotely
Logic Bomb
Some form of malware that sends your info back to the creator of it
Spyware
Blue-Jacking
Linking up to someones bluetooth without permission just to use resource
This is a built-in Windows tool to write and custom build scripts to automate tasks
PowerShell
Type of secure operating system?
-certified machines that are locked down as much as possible while keeping functionality
Trusted OS
What are removable media controls?
Not allowing people to use optical drives - can shut it off or put a policy on it
ACL that allows programs
White List
Software that’s running on your system - could be software you’re using but is also doing something bad in the background
Trojan
Scan results identify a file that may not actually harm a system or is actually allowed on the system
False Positive
Records keystrokes
Keylogger
Destroying
Will ruin the data and physical media - this includes paper, tape, electronic data, etc.
Ex: Burning, shredding, pulping
ACL that denies programs
Black List
Type of secure operating system?
-appliance
Embedded System
Software that escalates privileges to execute other things on computer - could be good or bad
Rootkit
Application management / Desktop Management tools
Used to make sure everyone is running the correct version of things and all licenses are accounted for
IPS
- Active IDS
- Usually close to the edge of the network
- Action to prevent will occur at the IPS device
Intrusion Prevention System
Hidden Wifi
Ex: they make sd cards wifi cards - you cna plug them into someones printer/security camera and now you’ve created a wifi hotspot on their network
SAN
- Creates new local drives - not network drives
- ISCSI is another name for this
Storage Area Networking
TPM
-Chip that holds encryption keys for that drive - usually activated at bios to be able to encrypt drive
Trusted Platform Module
NAS
- File based sharing protocol
- Runs over standard network
ex: SMB share
Network Attached Storage
SFC
- Is a file integrity tool
- Checks windows core files
System File Checker
RFI
Radio Frequency Interference
What does a file integrity check do?
Verifies the file isn’t corrupted and that the version and date match expectation
ESD
Electrostatic Discharge
Type of malware that locks up your system until you pay someone money
Ransomware/crypto-malware