Term
In networking, any device with an IP address is a ___.
Consequently, the term host includes ___. |
|
Definition
host Servers, clients routers firewalls and even many mobile phones |
|
|
Term
| What are some elements of host hardening? |
|
Definition
backup regularly restrict physical access install OS with secure configuration options minimize number of applications harden all remaining applications download and install patches manage users and groups manage access permissions securely ENCRYPT DATA IF APPROPRIATE Add host firewall READ OS LOGS REGULARLY run vulnerability tests |
|
|
Term
| what is a security baseline? |
|
Definition
| it is a set of specific actions to be taken to harden all hosts of a particular type (windows, Mac OS) and of particular versions within each type (windows 7, 8, XP, etc) |
|
|
Term
|
Definition
| a full copy of an OS installation which includes having created a few secure software installations and having tested them extensively. |
|
|
Term
| what is a virtual disk image? |
|
Definition
| an image that can be independently deployed across a variety of hardware platforms using virtualization |
|
|
Term
|
Definition
| allows multiple operating systems, with their associated applications and data, to run independently on a single physical machine. These Virtual Machines run their own OS and share local system resources. |
|
|
Term
Describe the following virtualization analogies. Bachelor pad single family home Hotel |
|
Definition
Bachelor Pad: one OS running on one physical computer
single family home: running multiple OS running on a single physical computer. RAM, CPU and hard drive space are all shared.
hotel:a stack of physical servers hosting tens, or hundreds, of virtual machines at the same time. |
|
|
Term
| What are some benefits of virtualization in host hardening? |
|
Definition
| allows SAs to create a single security baseline for each server within the organization |
|
|
Term
| IT employees who manage individual hosts or groups of hosts are called ___. What don't these people do in their scope of work? |
|
Definition
Systems Administrators
They generally don't administer the network |
|
|
Term
|
Definition
| A screen, keyboard and a connection to a mainframe |
|
|
Term
What part of the network is a frequent target of attack?
Why is this? |
|
Definition
Server Operating System.
Servers contain valuable data, are a critical part of corporate information systems and provide an excellent platform to launch attacks. |
|
|
Term
| What is microsoft's server OS? |
|
Definition
|
|
Term
| Most administrative tools in windows server come in the same general format called ___. |
|
Definition
| Microsoft Management Console (MMC) |
|
|
Term
| In the "Computer Management" section in the MMC, what is an important feature? |
|
Definition
| Snap-ins, which are individual applications on the tree pane |
|
|
Term
| ___ is a popular OS for the largest servers |
|
Definition
|
|
Term
| A company doesn't just purchase UNIX, it purchases ___ |
|
Definition
| a specific version of UNIX |
|
|
Term
|
Definition
|
|
Term
| Different versions of UNIX usually have ___ |
|
Definition
| different management tools, including security tools. |
|
|
Term
| Linux is only the OS kernel. What linux vendors offer are ___. What do those do? |
|
Definition
Distributions.
They combine the kernel with other software. |
|
|
Term
| Linux is a version of UNIX that runs on ___ |
|
Definition
|
|
Term
| many firms find Linux is rather ___ to administer, especially if ___. |
|
Definition
Exepensive
they have many distributions in use from multiple linux vendors |
|
|
Term
| Even within a specific version of UNIX, the OS may come with ___. |
|
Definition
| several alternative user interfaces |
|
|
Term
| Linux has two popular GUIs. What are they. |
|
Definition
|
|
Term
| UNIX calls command line interfaces ___ |
|
Definition
|
|
Term
| What is a positive of a CLI shell? |
|
Definition
| uses fewer systems resources than a GUI |
|
|
Term
| the ___ was one of the first popular shells. The current market leader is the ___. |
|
Definition
Bourne shell
Bourne Again Shell (BASH) |
|
|
Term
| ___ are security weaknesses that open a program to attack |
|
Definition
|
|
Term
| some vulnerability finders sell found vulnerabilities to hackers who develop ___. What are these? |
|
Definition
| exploits: programs that take advantage of vulnerabilities. |
|
|
Term
| what is a zero-day attack? |
|
Definition
| an attack that comes before fixes are released. |
|
|
Term
| When is the most dangerous period when fixes are released? |
|
Definition
| Right after. attackers reverse engineer the fix and attack non-patched systems. |
|
|
Term
| What are the four fixes and their descriptions? |
|
Definition
work around: manual actions to be taken, no new software. Labor intensive, expensive, error prone.
Patches: small programs that fix vulnerabilities.
Service Packs: collections of patches and improvements
Upgrading to a new version: vulnerabilities fixed in new versions, old versions not supported |
|
|
Term
| Why must SAs be cautions about enabling automatic updates on all windows computers? |
|
Definition
| it can cause substantial downtime of critical systems. |
|
|
Term
| What is, often times, the best fix to vulnerabilities? |
|
Definition
| upgrade to the newest version. Problems are corrected in newer versions and each version has better security. |
|
|
Term
| Do UNIX vendors all use the same patch download approach? |
|
Definition
|
|
Term
|
Definition
| the method Linux vendors distribute patches. |
|
|
Term
| What are some problems with patching? |
|
Definition
sheer number of patches (time from the security manager) Cost of patch installation (finding and installing) Prioritizing patches by priority (some get left out) |
|
|
Term
| ___ describes what software is running on the servers and then actively assess what programs need to be patched and execute the patch. |
|
Definition
|
|
Term
| What is windows Server Update Services (WSUS) |
|
Definition
| a service on Windows Server that manages patches, hotfixes and updates in corporate environments. |
|
|
Term
| What are some risks of installing patches? |
|
Definition
added security often comes at the cost of reduced functionality.
some patches freeze machines or do other damage. |
|
|
Term
| For stand alone windows servers, an administrator can tun to the ___ MMC and use the ___ snap-in to manage users and groups. |
|
Definition
computer management local users and groups |
|
|
Term
what is a super user account? what is it called for windows and UNIX? |
|
Definition
an account that has total control over the computer. Windows = administrator UNIX = Root |
|
|
Term
| Why should you assign security measures to groups? |
|
Definition
reduces labor costs compared to assigning measures to individual accounts.
assigning permissions to groups reduces errors
because group permissions are more obvious than individual permissions. |
|
|
Term
| What is one of the main goals of hackers? |
|
Definition
| to take over the super user account |
|
|
Term
| How do you limit using the super user account? what is the command for windows and UNIX? |
|
Definition
use it as little as possible. Use the RunAs command SU (Switch User) |
|
|
Term
| what are the two steps to appropriately use a super account? |
|
Definition
| log in as ordinary user switch to super user only when needed |
|
|
Term
| to each account and group, SAs assign ___. What does that do? |
|
Definition
permissions. specify what the user/group can and cant do to files directories and sub directories. |
|
|
Term
| What are the six standard permissions in windows? |
|
Definition
Full control. modify read and execute list folder contents read write |
|
|
Term
| what does inheritance mean? |
|
Definition
| a directory receives permissions from the parent directory. |
|
|
Term
| How many permissions are in the advanced button on the security tab in windows? |
|
Definition
|
|
Term
| How many user/group permissions does UNIX have? What are they |
|
Definition
3 read (read only) write (make changes) Execute (for programs) |
|
|
Term
| What is one of the most effective ways of hardening a host? What are some basic guidelines for this? |
|
Definition
strong passwords 8 characters long at least 1 change of case, not at the start at least one digit, not at the end at least one non-alphanumeric character, not at the end. |
|
|
Term
| What does windows and LINUX use for hashing? |
|
Definition
windows 7 = NTLM Linux = DES, MD5, Blowfish or SHA |
|
|
Term
| the ___ separates password hashes from other user information and restricts access so only super users can access the file. |
|
Definition
|
|
Term
| stealing the ___ from a remote computer can be ___. |
|
Definition
password hashes a substantial obstacle |
|
|
Term
| what are the four password cracking techniques? |
|
Definition
brute force guessing dictionary attacks hybrid dictionary attacks rainbow tables |
|
|
Term
| Can dictionary attacks search for multiword combinations? |
|
Definition
|
|
Term
| ___ try simple modifications of common words contained in a dictionary file. These predefined modifications are called ___. |
|
Definition
hybrid dictionary attack mangling rules |
|
|
Term
|
Definition
| a list of pre-computed password hashes that are indexed. |
|
|
Term
| what is a time-memory trade-off? |
|
Definition
| more memory is used to store pre-computed password hashes, but the time it takes to crack a password is reduced |
|
|
Term
| what are some other password threats? |
|
Definition
keystroke capture (physical key logger) and password stealing programs
shoulder surfing |
|
|
Term
| Windows Xp service pack 2 indtroduced the ___ to give the user a quick status check of the PCs main security posture settings. Windows 7 replaced this with ___ |
|
Definition
windows security center windows action center |
|
|
Term
| In order to adequately harden a client PC, it is important that each of the following security components are enabled |
|
Definition
Windows Firewall Windows update virus protection spyware protection internet security settings user account control network access protection |
|
|
Term
| What type of firewall was introduced with XP service pack 2? |
|
Definition
| stateful packet inspection |
|
|
Term
| due to the short time between the release of patches and widespread use of exploits that take advantage of patched vulnerabilities, what is the only thing that makes sense in large corporations? |
|
Definition
| completely automatic operation (automatic updates) |
|
|
Term
| what are some ways that antivirus is made ineffective? |
|
Definition
user turns off the antivirus
user turns off automatic downloads for new signatures computer is off during updates user may not pay the annual fee |
|
|
Term
| ___ provide an audit trail for system events? |
|
Definition
|
|
Term
| What are some threats to laptops? |
|
Definition
loss/theft loss of capital investment loss of data that were not backed up loss of trade secrets loss of private information leading to lawsuits |
|
|
Term
| what are four good policies for sensitive data for mobile devices. Name the devices it should apply to. |
|
Definition
limit what sensitive data can be stored on a mobile PC
encrypt all mobile computers, regardless of sensitive information
protect them with strong passwords or biometrics
audit the first three policies.
USB RAM, MP3, phones, notebook disk drive |
|
|
Term
| what does computer recovery software accomplish? |
|
Definition
| allows the recovery of some lost or stolen notebooks. When it is connected to the internet, the software reports its IP address to a recovery company |
|
|
Term
| ___ focuses primarily on controlling initial access to the network |
|
Definition
| network access control (NAC) |
|
|
Term
|
Definition
| it queries the PC for information in windows security center/action center. this ensures that the PC has automated updating installed and has up to date antivirus program, etc. |
|
|
Term
| what happens if a client PC fails the initial NAC inspection? |
|
Definition
1. the NAC can forbid access to the network 2. More commonly, the user is given access to a single remediation server. |
|
|
Term
| Most NACs also monitor ___, after the initial health check. |
|
Definition
|
|