Hardening Techniques

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/7

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:07 PM on 12/20/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

8 Terms

1
New cards

Hardening

The process of securing a system by reducing its "surface of vulnerability." This involves disabling unnecessary services, removing unused software, closing open ports, and applying strict configuration settings to make the system more resistant to attack.

2
New cards

Change Management

A formal process used to ensure that changes to a product or system are introduced in a controlled and coordinated manner. It reduces the possibility that unnecessary changes will be introduced to a system without forethought, introducing faults into the system or undoing changes made by other users.

3
New cards

Least Privilege

The security concept that a user, system, or process should have only the minimum access rights necessary to perform its function, and nothing more.

4
New cards

Disable Unnecessary Services

The practice of turning off background programs and protocols that are not required for the system's primary function. This prevents attackers from exploiting vulnerabilities in software that shouldn't be running in the first place.

5
New cards

Patch Management

The strategic process of acquiring, testing, and installing code changes (updates) to existing software and systems. It ensures that known vulnerabilities (CVEs) are fixed before attackers can exploit them.

6
New cards

Baselining

The process of measuring and establishing a "standard" state of a system's performance and security configuration. This "snapshot" is used as a reference point to detect anomalies later.

7
New cards

Group Policy (GPO)

A feature of Microsoft Windows Active Directory that allows an administrator to manage the configuration of users and computers centrally. It can enforce security settings across thousands of machines instantly.

8
New cards

Full Disk Encryption (FDE)

A hardening method that encrypts the entire storage drive of a device. If the device is lost or stolen, the data remains unreadable without the decryption key, protecting it from offline attacks.