Vulnerability Management & System Hardening Flashcards
What are the steps of managing vulnerabilities?
Scanning, analysis, prioritization, and mitigation/remediation
What is the purpose of scanning in vulnerability management?
Identify vulnerabilities and what is scanned includes ports and services running on those ports
What tool is commonly used for scanning?
NMAP
What is the Cyber Kill Chain?
A model that outlines the stages of a cyber attack
Why is the Cyber Kill Chain useful?
It helps in understanding and preventing cyber attacks
What are the goals of hardening?
Shrink attack surface
How can hardening be achieved?
Close ports, turn off file sharing, uninstall software not in use
What is patch management?
Automation for updates, setting when to update and waiting to verify that it works
What is the function of firewalls?
Manage incoming and outgoing traffic
At what level does a stateful firewall operate?
Level 4
What role do anti-virus/anti-malware programs serve?
Close off your machine and sometimes are impossible to remove
What is sandboxing?
Downloading content into virtual machines
What are examples of encryption technologies?
- BitLocker
- FileVault
What is a key practice regarding passwords in hardening?
Remove default passwords and built-in accounts (routers)
What are two aspects of mobile hardening?
- App permissions
- Limit app installation