2.5 Explain the purpose of mitigation techniques used to secure the enterprise.

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Segmentation

Divides networks into smaller parts to limit access and damage

Such as dividing finance and HR networks to reduce lateral movement.

2
New cards

Access Control

Rules that define who or what can access resources, like an HR group being exclusive to the employee records folder

Can be ACL

3
New cards

Permissions (ACL)

Defines user capabilities within systems, like having read only vs read write access to a shared drive

4
New cards

Application Allow List

Only approved apps can be run

Example: Only MS office apps are allowed to be executed on work computers

5
New cards

Isolation

Seperates risky systems or processes from the main environment

Such as, running malware samples in a sandbox

6
New cards

Patching

Fixes security flaws in software

Example: Updating OS to fix known Privilege escalation flaw

7
New cards

Encryption

Secures data by converting it into unreadable form

Using AES to protect sensitive emails

8
New cards

Monitoring

Tracks system activity for anomalies

Like a SIEM log showing a suspicious login attempt.

9
New cards

Least Privilege

Users only get the access needed to perform their job

Example: Interns can install software on their laptop

10
New cards

Configuration Enforcement

Ensures systems follow security policies

Example: Blocking the use of outdated TLS

11
New cards

Decommissioning

Securely retiring and removing systems, like wiping data before disposing of old servers

12
New cards

Encryption (Hardening)

Adds protection by encrpyting systems and communications, like a Full disk encryption on employee laptops can secure and protect the data on the device.

13
New cards

Endpoint (Hardening)

Installing a antivirus or endpoint detection response on devices to detect/block threats, like crowdstrike running on all company PCs

14
New cards

Host based firewall (Hardening)

Filters traffic on individual machines, like the windows firewall app blocking incoming FTP requests

15
New cards

Host based Intrusion Prevention Systems (HIPS)

Detects and blocks suspicious behavior on hosts, Example, A HIPS can stop scripts from modifying system registry

16
New cards

disabling ports/protocols

Closes unneccesarry services to reduce attack surfaces, such as disabling telnet and USB ports to prevent them from being attacked

17
New cards

change Default Credentials

replaces vendor or default credentials to prevent easy compromises, like changing a route admin:admin to a stronger and unique passowrd

18
New cards

Removal of unnecessary software

Reduces attack surface by uninstalling unused apps, by removing default games and trial softtware from company laptops