Udemy Sections 4-6: Security Applications and Devices, Mobile Device Security, and Hardening Flashcards
Software application that protects a single computer or server from unwanted internet traffic
Personal firewall
AKA host-based firewall
Which firewall is used with Windows?
Windows Firewall
What do you need to type in the Start bar to find the Windows Firewall with Advanced Security?
wf.msc
Which firewall is used with Mac?
PF (Packet Filter)
IPFW (Internet Protocol Firewall) is the older version that is no longer used
Which firewall is used with Linux?
iptables
T/F: Most antimalware software includes its own firewall
True
T/F: Most small/home office routers and access points have their own hardware firewall included
True
What does Stealth Mode in Apple’s GUI firewall mean?
Your computer will not respond to or acknowledge any attempt to ping (or otherwise test an application by using ICMP)
Device or software application that monitors a system or network and analyzes the data passing through it in order to identify an incident or attack
IDS (Intrusion Detection System)
3 types of detection methods that NIDS and HIDS use
Signature-based
Policy-based
Anomaly-based
A type of IDS detection method where a specific string of bytes triggers an alert
Signature-based detection method
A type of IDS detection method that relies on specific declaration of the security policy (i.e., “No Telnet Authorized”)
Policy-based detection method
A type of IDS detection method that analyzes the current traffic against an established baseline and triggers an alert if outside the statistical average
Anomaly-based detection method
AKA statistical-based detection method
4 types of IDS alerts
True positive
True negative
False positive
False negative
T/F: IDSs can alert, log, and stop suspicious activity
False
IDSs cannot take action on security incidents; they only alert and log
To stop attacks, you must have an IPS
Where does the data from IDS logs go to prevent an attacker damaging or altering the logs?
Syslog server
Software that blocks external files containing JavaScript, images, or web pages from loading in a browser
Content filter
Software that filters website code as it is being downloaded from the server, and removes the advertisements
Adblock
A cybersecurity software or hardware solution that monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the data
DLP (Data Loss Prevention)
Theft or unauthorized removal or movement of any data from a device
Exfiltration
Software-based client that monitors the data in use on a computer and can stop a file transfer or alert an admin of the occurrance.
Can be set to detection mode or prevention mode.
Endpoint DLP system
Software or hardware-based solution that is installed on the perimeter of the network to detect data in transit, focusing on data moving out of the network to catch data that should stay in the network.
Network DLP system
Software installed on servers in the datacenter to inspect the data at rest. The data should be encrypted and watermarked, and no one should be accessing it at times that they shouldn’t be.
Storage DLP system
Cloud software as a service that protects data being stored in cloud services
Cloud DLP system
4 types of DLP systems
Endpoint DLP system
Network DLP system
Storage DLP system
Cloud DLP system
A type of firmware that provides the computer instructions for how to accept input and send output
BIOS (Basic Input Output System)
Updated and more robust version of BIOS
UEFI (Unified Extensible Firmware Interface)
Ensuring that the BIOS has the most up-to-date software on the chip
Involves removing what is currently on the chip, and replacing it with the newer, updated version
Flashing the BIOS
A password set on a computer that prevents anyone from logging into the BIOS changing the boot order or other settings without having that password. Should be a long, strong password.
BIOS password
Settings within the BIOS that enables or disables ways to boot up the hard drive
Boot order
5 ways to secure your BIOS
Flash the bios
Set a BIOS password
Configure the BIOS boot order
Disable unnecessary external ports and devices
Enable the secure boot option
A type of boot option that, upon booting, your computer verifies the public key from the TPM to ensure the code of the OS that’s being loaded has been digitally signed by the manufacturer and has not been modified. Ensures that you have a protected boot process.
Secure boot
What should you do to protect confidentiality of the data on removable media devices?
Encrypt files
3 methods to encrypt files for removable media
Windows 10 Bitlocker To Go
USB thumb drive that already has encryption embedded
Removable media controls
Technical limitations placed on a system in regards to the utilization of USB storage devices and other removable media
Removable media controls
2 ways to enforce removable media controls
Technical controls in Group Policy
Administrative controls
Storage devices that connect directly to your organization’s network
NAS (Network Attached Storage)
What do NAS systems implement to ensure high availability?
RAID arrays
A network designed specifically to perform block storage functions that may consist of NAS devices
SAN (Storage Area Network)
3 tips to secure a NAS
Use data encryption
Use proper authentication
Log NAS access
Storage device that performs whole disk encryption by using embedded hardware
Very fast, but very expensive
SED (Self-Encrypting Drive)
A type of hardware encryption
2 types of encryption
Hardware-based
Software-based
T/F: Hardware-based encryption is more commonly used than software-based
False
The opposite is true.
Embedded whole-disk encryption in the Mac OS is called
What encryption algorithm does it use?
FileVault
AES
Embedded whole-disk encryption in Windows is called
What encryption algorithm does it use?
BitLocker
AES
Chip residing on the motherboard that contains a hardware encryption key used by the machine’s embedded whole-disk encryption.
This prevents an attacker from removing the drive from the system and reading it; it cannot be read if the drive is removed from the system because it will not have the encryption key.
TPM (Trusted Platform Module)
T/F: If your motherboard doesn’t have a TPM, you can use an external USB drive as a key
True
But if you lose that USB, you’ll never be able to access that data again
What type of encryption is AES? (symmetric/asymmetric)
Which encryption keys does it support?
Symmetric
128-bit and 256-bit
Considered unbreakable
AES stands for
Advanced Encryption Standard
The file-level encryption algorithm used by Windows
EFS (Encrypting File System)
T/F: Software-based encryption is slower than hardware-based encryption
False
The opposite is true
Physical devices that act as a secure cryptoprocessor during the encryption process. In other words, it acts as a hardware-based encryption device.
Usually a device that plugs in through USB or a network-attached device.
HSM (Hardware Security Module)
HSM stands for
Hardware Security Module
Used when conducting monitoring, logging, and analysis of endpoints
Endpoint analysis
Software capable of detecting and removing virus infections and (in most cases) other types of malware, such as worms, Trojans, rootkits, adware, spyware, password crackers, network mappers, DoS tools, and others
Antivirus (AV)
AV stands for
Antivirus
A type of IDS or IPS that monitors a computer system for unexpected behavior or drastic changes to the system’s state on an endpoint
HIDS/HIPS
A software agent and monitoring system that performs multiple security tasks such as AV, HIDS/HIPS, firewall, DLP, and file encryption. The “swiss army knife” of security tools.
Mostly based on signature detection.
EPP (Endpoint Protection Platform)
EPP stands for
Endpoint Protection Platform
A software agent that collects system data and logs for analysis by monitoring a system to provide early detection of threats.
Mostly based on data collection and behavioral and anomaly analysis
EDR (Endpoint Detection and Response)
EDR stands for
Endpoint Detection and Response
A system that can provide automated identification of suspicious activity by user accounts and computer hosts
Mostly based on the process behavioral analysis, rather than endpoint data collection
UEBA (User and Entity Behavior Analytics)