Security Applications & Devices Flashcards
IDS & IDS Alerts
Intrusion Detection System:
Passively monitors network and alerts/identifies attacks
HIDS = Host-based | NIDS = Network-based
Signature, Policy, Anomaly-based
True Positive: Malicious activity is identified as an attack
False Positive: Legitimate activity is identified as an attack
True Negative: Legitimate activity is identified as legitimate traffic
False Negative: Malicious activity is identified as legitimate traffic
DLP & 3 Types of DLPs
Data Loss Prevention (Software or Hardware):
Monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the data
Also called Information Leak Protection (ILP) or Extrusion Prevention Systems (EPS)
Network DLP System
Software or hardware-based solution that is installed on the perimeter of the network to detect data in transit
Storage DLP System
Software installed on servers in the datacenter to inspect the data at rest
Cloud DLP System
Cloud software as a service that protects data being stored in cloud services
Securing BIOS
- Flash the BIOS
- Use a BIOS password
- Configure the BIOS boot order
- Disable the external ports and devices
- Enable the secure boot option
Securing NAS/SAN
- Use data encryption
- Use proper authentication
- Log NAS access
SED
Self-Encrypting Drive:
Storage device that performs whole disk encryption by using embedded hardware
Disk Encryption Software
Apple: FileVault
Windows: BitLocker
TPM
Trusted Platform Module:
Chip residing on the motherboard that contains an encryption key
If your motherboard doesn’t have TPM, you can use an external USB drive as a key
HSM
Hardware Security Module:
Physical devices that act as a secure cryptoprocessor during the encryption process
EPP
Endpoint Protection Platform:
A software agent and monitoring system that performs multiple security tasks such as anti-virus, HIDS/HIPS, firewall, DLP, and file encryption
EDR
Endpoint Detection & Response:
A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats
Doesn’t use signature-based protection
Behavioral analysis, ML, process monitoring
Lightweight agent on the endpoint
Root cause analysis
UEBA
User & Entity Behavior Analytics:
A system that can provide automated identification of suspicious activity by user accounts and computer hosts
UEBA solutions are heavily dependent on advanced computing techniques like artificial intelligence (AI) and machine learning
Many companies are now marketing advanced threat protection (ATP), advanced endpoint protection (AEP), and NextGen AV (NGAV) which is a hybrid of EPP, EDR, and UEBA