1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
File Integrity Monitoring (FIM)
Watch for unexpected changes to important system and application files—especially those that shouldn’t change unless there’s an update.
If these files are modified can trigger alerts or take action.
Windows uses the System File Checker (SFC) to check and repair system files.
On Linux, tools like Tripwire offer real-time file monitoring
Are also built into many host-based intrusion prevention systems (HIPS)
Data Loss Prevention (DLP)
Monitor for sensitive information—like Social Security numbers or medical data—being transmitted across the network.
Can block this data in real time as it moves across the network
Some monitor network traffic directly, while others run on individual devices as software.
On-computer DLP
Something that will monitor data in use, which means the data is in the active memory of that system
Or we’ll refer to it as an endpoint DLP, the endpoint being that individual system
Monitoring data in motion
DLP solution is connected to the network and it’s monitoring packets in real time
May be integrated into a next-generation firewall or it might be a standalone DLP appliance.
Monitor data at rest.
DLP that monitors files that are stored in the file system of an operating system.
A DLP solution that usually runs as software directly on that server or operating system itself.
USB Blocking
DLP software on endpoints can restrict data transfers through USB ports to prevent data theft or malware introduction.
USB drives are small and portable, making them easy tools for exfiltration or infection.
In 2008, the U.S. Department of Defense experienced a major breach when a worm, agent.btz, spread via a USB drive. Led to a complete ban on USB storage devices across the DoD.
Ban was enforced through local DLP agents, and lifted in 2010 after strict usage guidelines were introduced.
Cloud-Based DLP
Works like local or network DLP systems but monitors data flowing into and out of cloud applications.
Many also include protection against malware, viruses, and other threats, acting as a security layer for cloud storage and SaaS platforms.
As more applications move to the cloud, DLP solutions must also extend to cloud environments.
DLP & Email
Email is a major channel for data leaks, making it a key focus for DLP systems.
Email-based DLP scans both inbound and outbound messages for sensitive content.
Outbound DLP can block attempts to send Social Security numbers, W-2 forms, or fake wire transfers
Inbound DLP checks for suspicious keywords, spoofed addresses, or imposter emails, quarantining them before they reach users.
These solutions work whether your email is hosted locally or in the cloud,
Emailing A Spreadsheet Template
In November 2016, a Boeing employee accidentally emailed a spreadsheet to their spouse that appeared blank but actually contained hidden sensitive data for 36,000 employees, including Social Security numbers and birth dates.
An email-based DLP solution would have blocked this data leak.
Ironically, Boeing offers its own DLP software, which was not used internally at the time of the incident, though it is deployed on customer networks handling classified information.