Info Assurance Lesson 7 - Protecting a Cybersecurity Domain (Server Hardening)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Remote access

It refers to any combination of hardware and software that enables users to access a local internal network remotely

2
New cards

Secure Shell (SSH)

It is a protocol that provides a secure (encrypted) management connection to a remote device.

3
New cards

True

True or False:

SSH should replace Telnet for management connections.

4
New cards

Telnet

is an older protocol that uses unsecure plaintext transmission of both the login authentication (username and password) and the data transmitted between the communicating devices.

5
New cards

Secure copy (SCP)

It securely transfers computer files between two remote systems.

6
New cards

Secure copy (SCP)

It uses SSH for data transfer (including the authentication element), so this one, ensures the authenticity and confidentiality of the data in transit.

7
New cards

Securing Ports and Services

Cyber criminals exploit the services running on a system because they know that most devices run more services or programs than they need. So what are the best things to do?

8
New cards

Privileged accounts

Cyber criminals exploit _______________________________________ because they are the most powerful accounts in the organization.

9
New cards

Privileged accounts

It have the credentials to gain access to systems and they provide elevated, unrestricted access.

10
New cards

Privileged accounts

Administrators use these accounts to deploy and manage operating systems, applications, and network devices. These account should be secured or removed to mitigate these risks

11
New cards

Group Policies

In most networks that use Windows computers, an administrator configures Active Directory with Domains on a Windows Server.

12
New cards

password,

lockout

An administrator configures user account policies such as ______________________ policies and _____________________ policies by adding users to groups and setting policy at a group level.

13
New cards

log

It records events as they occur on a system.

14
New cards

Log entries

It make up a log file, and also it contains all of the information related to a specific event.

15
New cards

power

A critical issue in protecting information systems is electrical _____________ systems and ___________________ considerations

16
New cards

True

True or False;

A continuous supply of electrical power is critical in today's massive server and data storage facilities.

17
New cards

Hardware Monitoring

It is often found in large server farms.

18
New cards

server farm

It is a facility that houses hundreds or thousands of servers for companies.

19
New cards

Heating, Ventilation, and Air Conditioning (HVAC)

These systems are critical to the safety of people and information systems in the organization's facilities. When designing modern IT facilities, these systems play a very important role in the overall security.

20
New cards

Heating, Ventilation, and Air Conditioning (HVAC)

These systems control the ambient environment (temperature, humidity, airflow, and air filtering) and must be planned for and operated along with other data center components such as computing hardware, cabling, data storage, fire protection, physical security systems and power.