• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back

Reducing attack surface

Disable unnecessary services and protocols

Standardized images

Baseline images which include mandatory security configurations. Used to identify anomalies by comparing image with live computers.

Host Software Baseline

Provide list of approved software and list of software installed on system. Used to identify unauthorized software on systems.

Baseline Reporting

provides report after comparing baselines with current systems.

Snapshot

copy of a VM at a particular point in time. Can be used as a backup

SCADA

Supervisory control and data acquisition: industrial control system within large facility

BYOD concerns

Data security is greatest concern. Mitigated through use of VLANs.

TPM

trusted platform module. Chip embedded in motherboard that provides full disk encryption. Storage root key can be activated which TPM uses to generate and store cryptographics keys

HSM

Hardware security module. Removable or external device that can generate and manage RSA keys.

endpoint DLP

Data loss prevention which restricts the use of hardware at endpoint (usb drives, mp3 players, etc.)

network-based DLP

data loss prevention which examines network traffic for PII or confidential data

IaaS

Infrastructure as a service. Provides customers with access to hardware in self managed platform

PaaS

Platform as a service. Provides clients with fully manged platform which vendors keeps up to date with patches.

Baseline reporting

monitors current configurations with baseline and reports discrepancies

application whitelisting vs blacklisting

whitelisting : allows whitelist & blocks all others