Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
Reducing attack surface |
Disable unnecessary services and protocols |
|
Standardized images |
Baseline images which include mandatory security configurations. Used to identify anomalies by comparing image with live computers. |
|
Host Software Baseline |
Provide list of approved software and list of software installed on system. Used to identify unauthorized software on systems. |
|
Baseline Reporting |
provides report after comparing baselines with current systems. |
|
Snapshot |
copy of a VM at a particular point in time. Can be used as a backup |
|
SCADA |
Supervisory control and data acquisition: industrial control system within large facility |
|
BYOD concerns |
Data security is greatest concern. Mitigated through use of VLANs.
|
|
TPM |
trusted platform module. Chip embedded in motherboard that provides full disk encryption. Storage root key can be activated which TPM uses to generate and store cryptographics keys |
|
HSM |
Hardware security module. Removable or external device that can generate and manage RSA keys. |
|
endpoint DLP |
Data loss prevention which restricts the use of hardware at endpoint (usb drives, mp3 players, etc.) |
|
network-based DLP |
data loss prevention which examines network traffic for PII or confidential data |
|
IaaS |
Infrastructure as a service. Provides customers with access to hardware in self managed platform |
|
PaaS |
Platform as a service. Provides clients with fully manged platform which vendors keeps up to date with patches. |
|
Baseline reporting |
monitors current configurations with baseline and reports discrepancies |
|
application whitelisting vs blacklisting |
whitelisting : allows whitelist & blocks all others |