Lesson 12: Implementing Host Security Solutions

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms and definitions from the lesson on hosting security solutions (secure firmware, endpoint security, and embedded/IoT security).

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Hardware Root of Trust (RoT)

A secure hardware subsystem that provides attestation, enabling the system to prove its integrity to a verifier (e.g., NAC) by signing reports about boot metrics and OS files.

2
New cards

Attestation

A trusted statement about a system's state (e.g., boot integrity) that a receiver can verify using trusted keys.

3
New cards

Trusted Platform Module (TPM)

A hardware-based cryptoprocessor that stores encryption keys, hashed data, and identifiers; supports attestation and key management for secure boot and disk encryption.

4
New cards

Endorsement Key

A unique, unchangeable asymmetric private key embedded in the TPM used to create subkeys for storage, signing, and encryption.

5
New cards

Owner (in TPM context)

An administrative identity that can take ownership of the TPM, potentially destroying and regenerating its subkeys.

6
New cards

KMIP (Key Management Interoperability Protocol)

A protocol for centrally provisioning and managing cryptographic keys in enterprise environments.

7
New cards

NAC (Network Access Control)

A server/system that enforces security policy by validating the trust state of devices attempting to join the network.

8
New cards

Secure Boot

UEFI feature that verifies the OS boot loader and kernel with vendor certificates to prevent unsigned or altered boot components from loading.

9
New cards

UEFI (Unified Extensible Firmware Interface)

Firmware interface that oversees boot processes and can enforce boot integrity checks using certificates.

10
New cards

Measured Boot

Boot process using TPM platform configuration registers (PCRs) to detect changes in boot firmware, boot loaders, kernel, and drivers.

11
New cards

PCR (Platform Configuration Register)

TPM registers that store measurements (hashes) of boot components to support measured boot and attestation.

12
New cards

Boot Attestation

Transmitting a TPM-signed boot log to a remote server to verify health and detect unsigned or modified boot components.

13
New cards

Disk Encryption (FDE)

Encrypts the entire drive to protect data at rest; keys are typically stored in the TPM or a secure token source.

14
New cards

Self-Encrypting Drive (SED)

Drive-based encryption that performs cryptographic operations in the drive controller with DEK/MEK and an authentication key (AK) or KEK.

15
New cards

BitLocker

Microsoft disk encryption tool that stores encryption keys in secure storage such as the TPM.

16
New cards

AK/KEK (Authentication Key / Key Encryption Key)

Keys used in SEDs to protect and manage the DEK/MEK; AK is user-authenticated, KEK protects key data.

17
New cards

Opal Storage Specification

TCG standard for self-encrypting drives enabling vendor-agnostic drive-based encryption compatible with NVMe/SSD.

18
New cards

KMIP-enabled HSM

Hardware security module used with KMIP to automate provisioning and management of cryptographic keys.

19
New cards

End of Life (EOL)

Phase when a product is discontinued and support and updates become limited.

20
New cards

End of Service Life (EOSL)

Period when a product is no longer supported by the vendor and no updates are provided.

21
New cards

Long-Term Support (LTS)

Versioning approach where software receives extended support and updates for an extended period.

22
New cards

Third-Party Risk Management

Assessment and governance of vendor and supplier security practices to protect the supply chain.

23
New cards

MOU (Memorandum of Understanding)

A formal or informal agreement expressing intent to collaborate, typically not legally binding.

24
New cards

BPA (Business Partnership Agreement)

A formal agreement outlining a partnership between vendors and solution providers.

25
New cards

NDA (Non-Disclosure Agreement)

A legal contract protecting confidential information shared between parties.

26
New cards

SLA (Service Level Agreement)

Contractual terms defining service performance and obligations between provider and customer.

27
New cards

MSA (Measurement Systems Analysis)

Quality management method to validate data collection and statistical methods used in security processes.

28
New cards

Baseline Configuration

A standard secure configuration template for a host, used to enforce consistent security settings.

29
New cards

GPO (Group Policy Object)

Windows policy framework used to apply configuration settings to domain-joined computers.

30
New cards

MBSA (Microsoft Baseline Security Analyzer)

Former Microsoft tool for validating security configuration; largely replaced by Security Compliance Toolkit.

31
New cards

Security Compliance Toolkit

Microsoft suite to compare production GPOs with template policy settings and enforce baselines.

32
New cards

Patch Management

Process of identifying, testing, deploying, and validating software or firmware updates to fix vulnerabilities.

33
New cards

A-V / Anti-Malware

Signature-based and heuristic protection to detect and prevent malware on hosts.

34
New cards

HIDS / HIPS (Host-Based IDS/IPS)

Security systems that monitor host activity and can detect or prevent malicious changes or actions.

35
New cards

EPP (Endpoint Protection Platform)

Unified security agent providing multiple functions (malware protection, firewall, IDS/IPS, DLP) on endpoints.

36
New cards

DLP (Data Loss Prevention)

Policies and tooling to prevent sensitive data from being exfiltrated or misused.

37
New cards

EDR (Endpoint Detection and Response)

Next-generation visibility and remediation for compromised endpoints, focusing on detection, containment, and forensics.

38
New cards

MDR (Managed Detection and Response)

Hosted security service providing monitoring, detection, and response across endpoints.

39
New cards

Next-Generation Firewall / Synchronized Security

Advanced firewall with analytics that can coordinate with endpoints to block threats and isolate hosts.

40
New cards

Sandboxing

Isolating untrusted code in a controlled environment to analyze behavior safely.

41
New cards

NB-IoT / LTE-M

Low-power cellular technologies for IoT with varying data rates and latency suitable for sensors.

42
New cards

eSIM / SIM

Embedded SIM vs removable SIM used to identify devices on cellular networks.

43
New cards

Z-Wave / Zigbee

Wireless, mesh-network protocols for home automation with encryption and device security considerations.

44
New cards

ICS/SCADA

Industrial Control Systems and Supervisory Control and Data Acquisition networks used in critical infrastructure.

45
New cards

Stuxnet

Notorious ICS/SCADA attack demonstrating targeting of control systems to disrupt processes.

46
New cards

NIST SP 800-82

NIST guidance on security controls for ICS and SCADA environments.

47
New cards

CAN Bus

Controller Area Network used in vehicles; limited or no built-in source addressing or authentication.

48
New cards

OBD-II

Onboard Diagnostics port used for vehicle diagnostics; potential attack surface for CAN/ECU compromise.

49
New cards

OSS/Wrapped Security (IPSec Wrappers)

Using IPSec to protect data in transit by wrapping traffic in a secure tunnel.

50
New cards

PACS (Physical Access Control System)

Security system managing physical access with locks, alarms, and surveillance.