Security Hardening Flashcards
Security Hardening
The process of strengthening a system to reduce its vulnerability and attack surface
attack surface
all the vulnerabilities that a threat actor could exploit
OS
Operating system
Patch update
addresses security vulnerabilities within a program or product
Baseline Configuration
A documented set of specifications within a system that is used as a basis for future builds, releases, and updates
SPP
Strong password policy
MFA
Multifactor Authentication
Dictionary Attack
using common dictionary words to try to guess a password
Hashing
converting a password to a hash that can be used to verify the autenticity of the password
Salting
adding random characters to a hashed password
CAPTCHA
Complete automated public turing test
Network Log Analysis
The process of examining network logs to identify events of interest
SEIM Tool
An application that collects and analyzes data to monitor critical activities in an organization. Ranks vulnerabilities from high to low
Port filtering
A firewall principle that blocks certain ports from being used
Encryption Standards
Rules/policies for how encryption is done
defense in depth
adding multiple layers of security to networks, devices, and software
Intrusion Detection system (IDS)
monitors system activity and alerts on possible intrusions. Does this by packet sniffing and analyzing for common intrusion methods.
Doesn’t stop traffic
Intrusion Prevention System
Proactively searches for signatures of known attacks and data anomalies in packets, and blocks the sender if it seems suspicious
Full packet captures
records and analyzes all the data transmitted over your network
IAM
Identity access management (processes and technologies that help orgs manage digital identities in their env.
Important idea: user role management
Configuration
Setting up the cloud systems
Zero Day Attack
An exploit that was previously unkown