Security+ 2 Flashcards
Port isolation : restricts traffic from source port to a single dest. port. this prevents devices on same switch from comm. with each other, which blocks data-link-layer attacks like ARP spoofing. Commonly used in public access networks but not for corporate settings.
Hardware Security Modules : use dedicated hardware for encryption, decryption and key management (encryption keys). ex : TPMs.
BIOS : lightweight OS stored in firmware that loads full OS from disk. Rarely used now.
info …
UEFI : has secure boot which reads boot loader from disk, computes hash of boot loader, decrypts boot loaders digital sig. and verifies that sig. is correct. Improves security upon BIOS.
Hardware Root of Trust : verifies firmware integrity.
EMPs are extreme bursts of EMI, may be generated by nuclear explosion.
Printer Security Practices : patch OS, secure printers webserver, encrypt print traffic w/TLS, securely wipe printer HDD’s if disposing of printer.
info …
Non-persistence : that devices components etc may fail. ex of prevention : automated server builds, system snapshots, reversion to a known state, live boot media carry instead of hardware.
Staged Release Process = Development Envir. : allows developers to create and modify code, Test Envir. : facilitates human and automated testing, Staging Envir. : prepares code for release to production,
Production Envir. : produces live services to users.
Sandboxing : development and testing envir. where programmers code to modify/test it w/o access to production resources.
info …
ICS (hackers dream) : can wipe out power grids or put out electricity, systems are often not well secured, systems are less likely to be current on patches.
Security Wrappers : device not accessible directly over network but is reached by wrapper system that monitors input and output for security issues and only passes through vetted requests from network systems, like a firewall.
SoC : combines processing, memory, networking, and other embedded system components on a single chip.
RTOS : provide reliable and secure computing for IoT devices. Provides resources to highest priority tasks in real time.
info …
Waterfall Model : system requirements, software requirements, preliminary design, detailed design, code and debugging, testing, operations and maintenance.
Spiral Model : determine requirements, risk assessment, development testing, planning phase (for future development work); is iterative and is repeated process.
Agile Model : value individuals and interactions over processes and tools, value working software over comprehensive documentation, value customer collaboration over contract negotiation, value responding to change over following a plan.
Waterfall/Spiral/Agile Model …
Verifying Code Sig.’s : user downloads software, OS uses cert.’s public key to validate sig., OS verifies the sig.’s hash matches the code.
Interpreted Code : computer executes source code instructions as written by developer. ex : R, Perl, PHP etc.
IaaS : purchase basic computing resources from vendors and put them together to create customized IT solutions.
info …
MSSPs : provide security services for other org.’s as a managed service. Should be carefully monitored, can manage entire security infrastructure, monitor system logs, manage firewalls or networks, perform identity and access management.
CASB : adds 3rd party security layer to interactions that users have w/other cloud services. Network-based CASB : broker intercepts traffic between user and cloud service monitoring security issues, broker can block requests. API-based CASB : broker queries cloud service by API; broker may not be able to block requests depending on API capabilities.
info …
Expanded Envelope : keeping datacenters between 64.4-80.6 degrees F. Dew Point Range : keeping center between 41.9-50.0 degrees F.
humidity too high causes condensation, humidity too low static electricity builds up.
Technical Controls : use tech. to deter, prevent, or detect security violations.
Compensating Controls : fill known gaps in security.
info …