Shared Flashcard Set

Details

Chapter 7
NA
73
Computer Science
Graduate
03/31/2014

Additional Computer Science Flashcards

 


 

Cards

Term
In networking, any device with an IP address is a ___.

Consequently, the term host includes ___.
Definition
host
Servers, clients routers firewalls and even many mobile phones
Term
What are some elements of host hardening?
Definition
backup regularly
restrict physical access
install OS with secure configuration options
minimize number of applications
harden all remaining applications
download and install patches
manage users and groups
manage access permissions securely
ENCRYPT DATA IF APPROPRIATE
Add host firewall
READ OS LOGS REGULARLY
run vulnerability tests
Term
what is a security baseline?
Definition
it is a set of specific actions to be taken to harden all hosts of a particular type (windows, Mac OS) and of particular versions within each type (windows 7, 8, XP, etc)
Term
what is a disk image?
Definition
a full copy of an OS installation which includes having created a few secure software installations and having tested them extensively.
Term
what is a virtual disk image?
Definition
an image that can be independently deployed across a variety of hardware platforms using virtualization
Term
Describe Virtualization
Definition
allows multiple operating systems, with their associated applications and data, to run independently on a single physical machine. These Virtual Machines run their own OS and share local system resources.
Term
Describe the following virtualization analogies.
Bachelor pad
single family home
Hotel
Definition
Bachelor Pad: one OS running on one physical computer

single family home: running multiple OS running on a single physical computer. RAM, CPU and hard drive space are all shared.

hotel:a stack of physical servers hosting tens, or hundreds, of virtual machines at the same time.
Term
What are some benefits of virtualization in host hardening?
Definition
allows SAs to create a single security baseline for each server within the organization
Term
IT employees who manage individual hosts or groups of hosts are called ___. What don't these people do in their scope of work?
Definition
Systems Administrators

They generally don't administer the network
Term
What is a thin client?
Definition
A screen, keyboard and a connection to a mainframe
Term
What part of the network is a frequent target of attack?

Why is this?
Definition
Server Operating System.

Servers contain valuable data, are a critical part of corporate information systems and provide an excellent platform to launch attacks.
Term
What is microsoft's server OS?
Definition
Windows Server
Term
Most administrative tools in windows server come in the same general format called ___.
Definition
Microsoft Management Console (MMC)
Term
In the "Computer Management" section in the MMC, what is an important feature?
Definition
Snap-ins, which are individual applications on the tree pane
Term
___ is a popular OS for the largest servers
Definition
UNIX
Term
A company doesn't just purchase UNIX, it purchases ___
Definition
a specific version of UNIX
Term
what is a Kernel?
Definition
the core part of the OS.
Term
Different versions of UNIX usually have ___
Definition
different management tools, including security tools.
Term
Linux is only the OS kernel. What linux vendors offer are ___. What do those do?
Definition
Distributions.

They combine the kernel with other software.
Term
Linux is a version of UNIX that runs on ___
Definition
ordinary PCs
Term
many firms find Linux is rather ___ to administer, especially if ___.
Definition

Exepensive

they have many distributions in use from multiple linux vendors

Term
Even within a specific version of UNIX, the OS may come with ___.
Definition
several alternative user interfaces
Term
Linux has two popular GUIs. What are they.
Definition
Gnome
KDE
Term
UNIX calls command line interfaces ___
Definition
Shells.
Term
What is a positive of a CLI shell?
Definition
uses fewer systems resources than a GUI
Term
the ___ was one of the first popular shells. The current market leader is the ___.
Definition
Bourne shell

Bourne Again Shell (BASH)
Term
___ are security weaknesses that open a program to attack
Definition
vulnerabilities
Term
some vulnerability finders sell found vulnerabilities to hackers who develop ___. What are these?
Definition
exploits: programs that take advantage of vulnerabilities.
Term
what is a zero-day attack?
Definition
an attack that comes before fixes are released.
Term
When is the most dangerous period when fixes are released?
Definition
Right after. attackers reverse engineer the fix and attack non-patched systems.
Term
What are the four fixes and their descriptions?
Definition
work around: manual actions to be taken, no new software. Labor intensive, expensive, error prone.

Patches: small programs that fix vulnerabilities.

Service Packs: collections of patches and improvements

Upgrading to a new version: vulnerabilities fixed in new versions, old versions not supported
Term
Why must SAs be cautions about enabling automatic updates on all windows computers?
Definition
it can cause substantial downtime of critical systems.
Term
What is, often times, the best fix to vulnerabilities?
Definition
upgrade to the newest version. Problems are corrected in newer versions and each version has better security.
Term
Do UNIX vendors all use the same patch download approach?
Definition
no
Term
What is the RPM method?
Definition
the method Linux vendors distribute patches.
Term
What are some problems with patching?
Definition
sheer number of patches (time from the security manager)
Cost of patch installation (finding and installing)
Prioritizing patches by priority (some get left out)
Term
___ describes what software is running on the servers and then actively assess what programs need to be patched and execute the patch.
Definition
patch management servers
Term
What is windows Server Update Services (WSUS)
Definition
a service on Windows Server that manages patches, hotfixes and updates in corporate environments.
Term
What are some risks of installing patches?
Definition
added security often comes at the cost of reduced functionality.

some patches freeze machines or do other damage.
Term
For stand alone windows servers, an administrator can tun to the ___ MMC and use the ___ snap-in to manage users and groups.
Definition
computer management
local users and groups
Term
what is a super user account?
what is it called for windows and UNIX?
Definition
an account that has total control over the computer.
Windows = administrator
UNIX = Root
Term
Why should you assign security measures to groups?
Definition
reduces labor costs compared to assigning measures to individual accounts.

assigning permissions to groups reduces errors

because group permissions are more obvious than individual permissions.
Term
What is one of the main goals of hackers?
Definition
to take over the super user account
Term
How do you limit using the super user account? what is the command for windows and UNIX?
Definition
use it as little as possible.
Use the RunAs command
SU (Switch User)
Term
what are the two steps to appropriately use a super account?
Definition
log in as ordinary user switch to super user only when needed
Term
to each account and group, SAs assign ___. What does that do?
Definition
permissions.
specify what the user/group can and cant do to files directories and sub directories.
Term
What are the six standard permissions in windows?
Definition
Full control.
modify
read and execute
list folder contents
read
write
Term
what does inheritance mean?
Definition
a directory receives permissions from the parent directory.
Term
How many permissions are in the advanced button on the security tab in windows?
Definition
13
Term
How many user/group permissions does UNIX have? What are they
Definition
3
read (read only)
write (make changes)
Execute (for programs)
Term
What is one of the most effective ways of hardening a host? What are some basic guidelines for this?
Definition
strong passwords
8 characters long
at least 1 change of case, not at the start
at least one digit, not at the end
at least one non-alphanumeric character, not at the end.
Term
What does windows and LINUX use for hashing?
Definition
windows 7 = NTLM
Linux = DES, MD5, Blowfish or SHA
Term
the ___ separates password hashes from other user information and restricts access so only super users can access the file.
Definition
shadow file
Term
stealing the ___ from a remote computer can be ___.
Definition
password hashes
a substantial obstacle
Term
what are the four password cracking techniques?
Definition
brute force guessing
dictionary attacks
hybrid dictionary attacks
rainbow tables
Term
Can dictionary attacks search for multiword combinations?
Definition
yes
Term
___ try simple modifications of common words contained in a dictionary file. These predefined modifications are called ___.
Definition
hybrid dictionary attack
mangling rules
Term
what is a rainbow table?
Definition
a list of pre-computed password hashes that are indexed.
Term
what is a time-memory trade-off?
Definition
more memory is used to store pre-computed password hashes, but the time it takes to crack a password is reduced
Term
what are some other password threats?
Definition
keystroke capture (physical key logger) and password stealing programs

shoulder surfing
Term
Windows Xp service pack 2 indtroduced the ___ to give the user a quick status check of the PCs main security posture settings. Windows 7 replaced this with ___
Definition
windows security center
windows action center
Term
In order to adequately harden a client PC, it is important that each of the following security components are enabled
Definition
Windows Firewall
Windows update
virus protection
spyware protection
internet security settings
user account control
network access protection
Term
What type of firewall was introduced with XP service pack 2?
Definition
stateful packet inspection
Term
due to the short time between the release of patches and widespread use of exploits that take advantage of patched vulnerabilities, what is the only thing that makes sense in large corporations?
Definition
completely automatic operation (automatic updates)
Term
what are some ways that antivirus is made ineffective?
Definition
user turns off the antivirus

user turns off automatic downloads for new signatures
computer is off during updates
user may not pay the annual fee
Term
___ provide an audit trail for system events?
Definition
audit policies
Term
What are some threats to laptops?
Definition
loss/theft
loss of capital investment
loss of data that were not backed up
loss of trade secrets
loss of private information leading to lawsuits
Term
what are four good policies for sensitive data for mobile devices. Name the devices it should apply to.
Definition
limit what sensitive data can be stored on a mobile PC

encrypt all mobile computers, regardless of sensitive information

protect them with strong passwords or biometrics

audit the first three policies.

USB RAM, MP3, phones, notebook disk drive
Term
what does computer recovery software accomplish?
Definition
allows the recovery of some lost or stolen notebooks. When it is connected to the internet, the software reports its IP address to a recovery company
Term
___ focuses primarily on controlling initial access to the network
Definition
network access control (NAC)
Term
how does NAC work?
Definition
it queries the PC for information in windows security center/action center. this ensures that the PC has automated updating installed and has up to date antivirus program, etc.
Term
what happens if a client PC fails the initial NAC inspection?
Definition
1. the NAC can forbid access to the network
2. More commonly, the user is given access to a single remediation server.
Term
Most NACs also monitor ___, after the initial health check.
Definition
the client PCs traffic
Supporting users have an ad free experience!