4.1 - Computing Resources

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Secure Baseline

📏 A standardized, secure configuration for a specific system or device. (Purpose: To create a known-good starting point for all deployments.)

2
New cards

Establish (Baseline)

The process of creating the master image. (Action: Harden the OS, apply patches, install/configure required software like EDR.)

3
New cards

Workstation Hardening

  • Key Actions: Apply patches (OS & apps), enforce least privilege (no local admin rights), enable host-firewall, install Endpoint Protection (EDR/AV).

4
New cards

Mobile Device Hardening

Key Actions: Enforce via MDM (strong PINs, screen lock), enable Full-Disk Encryption, configure remote wipe, use application control (allow/deny lists).

5
New cards

Server Hardening

Key Actions: Disable all unneeded services/ports (e.g., a web server only needs 80/443), apply secure baseline, forward logs to SIEM, use File Integrity Monitoring (FIM).

6
New cards

Cloud Hardening

Key Actions: Configure strict IAM roles (least privilege), use Security Groups/NSGs (cloud firewall), encrypt data at-rest and in-transit, disable public access to storage/DBs.

7
New cards

Switches and Router Hardening

Key Actions: Disable unused physical ports (port security), use secure admin (SSH/HTTPS, not Telnet/HTTP), apply ACLs to filter traffic, update firmware.

8
New cards

ICS/Scada Hardening

KeyActions: Network segmentation (air gap or firewall from IT network), use compensating controls (like NIDS) since patching is rare/risky, rely on strong physical security.

9
New cards

Embedded Systems/IoT/RTOS Hardening

Key Actions: CHANGE DEFAULT PASSWORDS (most critical step!), place on an isolated VLAN/network, disable unneeded services (like UPnP or web admin), update firmware (if possible).

10
New cards

D

11
New cards
12
New cards

Deploy (Baseline)

The process of using the image. (Action: Use the baseline image for all new systems to ensure 100% consistency.)

13
New cards

Maintain (Baseline)

The process of keeping the baseline current. (Action: Update the master image with new patches, then re-deploy.)

14
New cards

📡 Wireless Site Survey

The process of analyzing a physical location to plan a Wi-Fi network. (Purpose: To find interference, ensure coverage, and optimize Access Point (AP) placement.)

15
New cards

Software used to manage and secure all mobile devices. (Scenario: Used to enforce policies (like encryption), push apps, and remote wipe a lost COPE phone.)

16
New cards

📱 MDM (Mobile Device Management)

17
New cards

Heat Map

A visual map created from a site survey. (What it shows: Wi-Fi signal strength and coverage, helping to find dead zones or signal bleed outside the building.)

18
New cards

BYOD (Bring Your Own Device)

  • Deployment Model: Employees use their personal devices for work.

  • Security Implication: High risk. Data is on a device the company doesn't own. Requires strong MDM with containerization.

19
New cards

COPE (Corporate-Owned, Personally-Enabled)

  • Deployment Model: Company owns the device, but lets the employee use it for personal tasks.

  • Security Implication: Good balance. Company has full control and can wipe it at any time.

20
New cards

CYOD (Choose Your Own Device)

  • Deployment Model: Company provides a list of approved devices for the employee to choose from.

  • Security Implication: Easier to manage than BYOD, as IT only has to support a few known, secure models.

21
New cards

Mobile Connection Methods

  • Cellular: Connects to the mobile carrier network (e.g., 4G/5G).

  • Wi-Fi: Connects to a local wireless access point (WAP).

  • Bluetooth: Short-range, point-to-point connection (e.g., headset, keyboard).

22
New cards

WPA 3

The most secure Wi-Fi protocol. (Key Feature: Uses SAE (Simultaneous Authentication of Equals), which replaces the WPA2-PSK handshake and protects against offline dictionary attacks.)

23
New cards

AAA/Radius

  • AAA: Authentication (Who are you?), Authorization (What can you do?), Accounting (What did you do?).

  • RADIUS: A protocol that implements AAA for network access. (Scenario: Used in WPA3-Enterprise to let users log in to Wi-Fi with their own username/password, not a shared key.)

24
New cards

Wireless Cryptographic Protocols

  • CCMP/AES: The secure standard. CCMP is the protocol, AES is the encryption algorithm it uses. (Used by WPA2 and WPA3.)

  • TKIP: Deprecated. The older protocol used by WPA. (Do not use.)

25
New cards

Wireless Authentication Protocols

  • EAP (Extensible Authentication Protocol): A framework for authentication, not a single protocol.

  • PEAP (Protected EAP): Encapsulates EAP in a secure TLS tunnel. (Commonly used, only requires a server-side certificate.)

  • EAP-TLS: The most secure EAP type. (Requires a client-side certificate on every device. Very high security, but complex to manage.)

26
New cards

Input Validation

Scrubbing, filtering, or rejecting user-provided data before processing. (Scenario: Prevents SQL Injection by stripping characters like ' or ; from a username field.)

27
New cards

Secure Cookies

An HTTP cookie sent with the Secure flag. (What it does: Forces the browser to only send the cookie back over HTTPS, preventing it from being stolen in a man-in-the-middle attack.)

28
New cards

Static Code Analysis (SAST)

Analyzing an application's source code for bugs and vulnerabilities without running the program. (Scenario: A developer's tool scans the code before compilation.)

29
New cards

Code Signing

Using a digital certificate to add a digital signature to an executable. (Purpose: Provides Integrity (proves the code wasn't tampered with) and Authenticity (proves it came from the real publisher).)

30
New cards

Sandboxing

Running an application in an isolated, restricted environment with limited access to the host OS. (Scenario: A browser runs a website's JavaScript in a sandbox so it can't read files from your C: drive.)

31
New cards

Monitoring

Continuously observing systems and networks for anomalies, policy violations, or attacks. (Scenario: A SIEM collecting logs from firewalls, servers, and EDR to detect a pattern of attack.)