Cybersecurity Basics Quiz
42 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary concern regarding the security of smart devices?

  • They have excellent security measures in place.
  • Their security is often neglected or inadequate. (correct)
  • They are impervious to network risks.
  • They use advanced encryption protocols by default.
  • What is a virtual machine?

  • An operating system designed for embedded systems.
  • A physical computer using traditional software.
  • A type of smart device for home automation.
  • A software simulation of a computing environment. (correct)
  • Which type of hypervisor runs directly on the host's hardware?

  • Cloud hypervisor
  • Type I hypervisor (correct)
  • Distributed hypervisor
  • Type II hypervisor
  • What is a key advantage of virtualization?

    <p>It reduces the number of physical machines needed.</p> Signup and view all the answers

    How does security vary in special-purpose systems?

    <p>It depends on the specific purpose and functionality of the systems.</p> Signup and view all the answers

    What is the primary purpose of anti-malware software?

    <p>To scan systems and networks for malicious software</p> Signup and view all the answers

    Which type of anti-malware can actively monitor system for signs of virus activity?

    <p>Antivirus</p> Signup and view all the answers

    Which of the following is a function of anti-spam filters?

    <p>To detect keywords used in spam messages</p> Signup and view all the answers

    Embedded systems often have which characteristic compared to PCs or servers?

    <p>Dedicated purpose with less sophisticated architecture</p> Signup and view all the answers

    Which of the following statements is true about anti-malware applications?

    <p>They should be installed on all devices and kept updated.</p> Signup and view all the answers

    What is one of the roles of external auditors in an organization's security compliance?

    <p>To check compliance with PCI DSS</p> Signup and view all the answers

    A pop-up blocker primarily prevents which of the following?

    <p>The display of unwanted browser elements</p> Signup and view all the answers

    Which of these is NOT a function of an embedded system?

    <p>Offering a user-friendly GUI for every application</p> Signup and view all the answers

    What is a characteristic of a Type I hypervisor?

    <p>It interacts directly with the hardware.</p> Signup and view all the answers

    Which cloud deployment model allows multiple entities to share ownership?

    <p>Community</p> Signup and view all the answers

    What is the main feature of public cloud services?

    <p>It typically requires pay-as-you-go subscriptions.</p> Signup and view all the answers

    What does cloud computing primarily rely on?

    <p>Real-time communication over distributed networks.</p> Signup and view all the answers

    Which of the following best defines Software as a Service (SaaS)?

    <p>Cloud-based applications are provided to users.</p> Signup and view all the answers

    In which type of cloud model does an organization maintain a dedicated network?

    <p>Private cloud model</p> Signup and view all the answers

    What is a common concern for services traversing the Internet?

    <p>Security vulnerabilities.</p> Signup and view all the answers

    Which type of hypervisor is considered to have more efficient resource management?

    <p>Type I hypervisor</p> Signup and view all the answers

    What is the primary goal of limiting dead code in application development?

    <p>To minimize security risks.</p> Signup and view all the answers

    What should server-side code primarily focus on according to secure coding techniques?

    <p>To validate user inputs and execute server-side logic.</p> Signup and view all the answers

    Why is limiting data exposure particularly critical in multi-user systems?

    <p>To ensure only necessary data is visible to users.</p> Signup and view all the answers

    In which programming languages is memory management typically handled manually?

    <p>C and C++.</p> Signup and view all the answers

    What is the purpose of using stored procedures in secure coding practices?

    <p>To prevent unauthorized access to data.</p> Signup and view all the answers

    What is a feature of Platform as a Service (PaaS)?

    <p>Offers virtual systems to customers.</p> Signup and view all the answers

    Which of the following best describes Infrastructure as a Service (IaaS)?

    <p>It provides data centers and networking resources.</p> Signup and view all the answers

    What type of connection does Wi-Fi primarily provide?

    <p>Local area connections for mobile devices.</p> Signup and view all the answers

    What is the main benefit of using a strong password or PIN for a device's lock screen?

    <p>It protects sensitive data from unauthorized access.</p> Signup and view all the answers

    Which deployment model provides employees with ownership and management of their devices?

    <p>BYOD</p> Signup and view all the answers

    Which of the following is a notable risk associated with Bluetooth technology?

    <p>Vulnerability to bluejacking and bluesnarfing.</p> Signup and view all the answers

    What does geofencing enable organizations to do?

    <p>Track and restrict device functionality based on geographic boundaries.</p> Signup and view all the answers

    How do MDM solutions typically function within an organization?

    <p>They offer a centralized console for managing all devices.</p> Signup and view all the answers

    What is a potential risk associated with the BYOD deployment model?

    <p>Increased security vulnerabilities due to personal device usage.</p> Signup and view all the answers

    What advantage does Screen Lock provide as a mobile device security control?

    <p>It restricts access based on user-defined codes.</p> Signup and view all the answers

    During which phase of the Software Development Lifecycle is security integration important?

    <p>Throughout all phases of the lifecycle.</p> Signup and view all the answers

    Which of the following best describes the primary use of Near Field Communication (NFC)?

    <p>In-person data exchange over short distances.</p> Signup and view all the answers

    What type of service does Security as a Service (SECaaS) primarily provide?

    <p>Resources focused on security measures.</p> Signup and view all the answers

    What is the primary aim of implementing access controls based on the principle of least privilege?

    <p>To restrict access to only those who need it for their role.</p> Signup and view all the answers

    What does remote wipe functionality allow an organization to do?

    <p>Remotely delete sensitive data from devices that are lost or stolen.</p> Signup and view all the answers

    In the context of the CYOD model, what is the employees' role regarding the devices?

    <p>They select devices from a predetermined list approved by the organization.</p> Signup and view all the answers

    Study Notes

    Implementing Host and Software Security

    • Implement Host Security
    • Implement Cloud and Virtualization Security
    • Implement Mobile Device Security
    • Incorporate Security in the Software Development Lifecycle

    Hardening

    • The security technique of altering a system's configuration to close vulnerabilities and protect the system against attack.
    • Typically implemented so systems conform to security policy.
    • Many different techniques are available.
    • Hardening may also restrict a system's capabilities.
    • Hardening must be balanced against accessibility.

    Operating System Security

    • Each OS has unique vulnerabilities for attackers to exploit.
    • Different OS types and OSes from different vendors have their own weaknesses.
    • Vendors try to correct vulnerabilities while attackers try to exploit them.
    • Stay up-to-date with security info posted by vendors and other references.
    • Different types of OSes:
      • Network
      • Server
      • Workstation
      • Appliance
      • Mobile

    Operating System Hardening Techniques

    • Implement a principle of least functionality.
    • Disable unnecessary network ports.
    • Disable unnecessary services.
    • Take advantage of secure configurations.
    • Disable default accounts.
    • Force users to change default passwords.
    • Implement a patch management service.

    Trusted Computing Base

    • The hardware, firmware, and software component responsible for ensuring computer system security.
    • Trusted operating system: Operating systems that fulfill security requirements as in a TCB.

    Hardware and Firmware Security

    • BIOS/UEFI: Basic Input/Output System and Unified Extensible Firmware Interface. Both firmware interfaces to initialize hardware for system boot. UEFI is more modern and secure.
    • Root of trust and HSM: Root of trust enforces trusted computing through encryption. Hardware security module is a physical device that implements root of trust.
    • TPM: Trusted Platform Module. Secure cryptoprocessor that generates keys for use in TCB. Secure boot is a UEFI feature that prevents malicious processes from executing during boot. Cryptographic hash taken of boot loader to ensure integrity. TPM can sign hash for third-party verification (remote attestation).

    Security Baselines

    • A collection of host security settings.
    • Compare the baseline to the security settings of hosts in your network.
    • Baselines are crucial for streamlining the host hardening process.
    • Don't harden hosts in a vacuum; use the baseline as a security template.
    • Each baseline will differ based on the computer's function and operating system.

    Software Updates

    • Patch: Small unit of code meant to address a security problem or functionality flaw.
    • Hotfix: A patch issued on an emergency basis to address a specific security flaw.
    • Rollup: A collection of previously issued patches and hotfixes.
    • Service pack: A large compilation of system updates that can include functionality enhancements and any prior patches, hotfixes, and rollups.

    Application Blacklisting and Whitelisting

    • Blacklisting: Preventing the execution of all apps that are on a list of unauthorized apps.
      • Drawback: You can't block malicious apps you haven't identified.
    • Whitelisting: Preventing the execution of all apps that aren't on a list of authorized apps.
      • Drawback: Creation and maintenance of list increases overhead.

    Logging

    • The process of an operating system or application recording data about activity on a computer.
    • Logs stored as text files with varying levels of detail.
    • Highly detailed logging can consume excessive storage space.
    • Logs can reveal information about a suspected attack.
    • Restrict access to logs and back them up routinely.

    Auditing

    • Performing an organized technical evaluation of a system's security to ensure it is in compliance.
    • Similar to a security assessment.
    • Auditing is focused more on ascertaining if the system meets a set of criteria.
    • Criteria come from laws, regulations, standards, and organizational policy.
    • Most audits are performed by third parties.
    • Example: External auditor checks to see if online merchant is in compliance with PCI DSS.
    • Commonly associated with reviewing log files.
    • Can also test passwords, scan firewalls, review user permissions. Audits contribute to the overall hardening process.

    Anti-malware Software

    • Software that scans systems and networks for malicious software.
    • Most scan for known malware.
    • Some can scan for unknown malware.
    • Install anti-malware on all computers.
    • Keep anti-malware apps updated.

    Types of Anti-malware Software

    • Antivirus: Scans for code matching virus patterns (signature-based). Can actively monitor system for virus activity (behavior-based or heuristic).
    • Anti-spam: Anti-spam filters detect key words used in spam messages. Can also block based on IPs of known spam sources. Functionality may come packaged with antivirus software.
    • Anti-spyware: Designed specifically to identify and stop spyware.
    • Pop-up blocker: Prevents websites from popping up elements in the browser. Most browsers include this functionality.
    • Host-based firewalls: Not specifically designed for anti-malware. Can still block network traffic used by malware.

    Embedded Systems

    • Hardware and software systems that have a specific function within a larger system.
    • Larger systems include everything from home appliances to industrial machines.
    • Embedded systems are found in all kinds of technology and industries.
    • Usually don't have the complexity of a PC or server.
    • Their dedicated purpose often means less sophisticated architecture.
    • May use an all-in-one microcontroller rather than discrete CPU/memory components.
    • May not have a GUI.
    • May still have an OS.
    • Larger system may be user-friendly even if embedded system is not.

    Security Implications for Embedded Systems

    • Smart devices: Smart devices are electronic devices with network connectivity. Smart devices have autonomous computing properties. Security is an afterthought or not thought of at all.
    • IoT: IoT devices are objects connected to the Internet. IoT devices use embedded electronic components. Like smart devices, security is very poor or non-existent.
    • Camera systems: IP cameras are easier to manager than CCTV. Susceptible to standard networking risks. Can use encryption protocols to protect recorded data.
    • Special purpose systems: Medical devices, ATMs, vehicles, etc. Security depends on purpose and functionality of systems.

    Virtualization

    • Virtualization: Creating a simulation of a computing environment.
    • Simulates hardware and software.
    • You create virtualized computers to run on physical computers.
    • Example: Virtual Linux computer running on physical Windows
    • Virtual machine: A virtualized computer.
    • Advantages: Easier to manage, Cost-efficient, Power and resource-efficient.

    Hypervisors

    • The layer of software that separates the virtual software from the physical hardware it runs on.
    • Manage resources on physical host and provide them to the virtual guests.
    • Provide flexibility and increased efficiency of hardware use.
    • Two basic types:
      • Type I: Run directly on host's hardware.
      • Type II: Run as an application on top of host operating system.

    Cloud Computing

    • Computing involving real-time communication over large distributed networks to provide various resources to a consumer.
    • Typically relies on the Internet.
    • "The cloud" refers to resources available on a particular service. Examples: Business sites, consumer sites, storage services, etc.
    • You can access and manage resources from anywhere.
    • Storage method and location are not visible to the consumer.
    • Cloud computing uses virtualization to provision resources.

    Cloud Deployment Models

    • Private: Usually distributed by a single entity over a private network. Enables entities to exercise greater controller over services. Geared toward banking and governmental services.
    • Public: Done over the Internet offering services to general consumers. Pay-as-you-go subscriptions and lower-tier services for free.
    • Community: Security is a concern for anything traversing the Internet. Multiple entities sharing ownership of a cloud service. Done to pool resources for a common concern.
    • Hybrid: Combines two or more of the previous models. Example: Private cloud for internal personnel, public for customers.

    Cloud Service Types

    • Software (SaaS): SaaS uses cloud to provide apps to users. Eliminates installation and purchasing of specific versions. Examples: Office 365, Salesforce, G Suite.
    • Platform (PaaS): PaaS provides virtual systems to customers. Can include operating systems and application engines. Examples: Oracle Database, Azure SQL Database, Google App Engine.
    • Infrastructure (IaaS): laaS provides access to infrastructure needs. Includes data centers, servers, networking, etc. Examples: Amazon EC2, Azure VMs, OpenStack.
    • Security (SECaaS): SECaaS provides resources for security purposes. Includes authentication, anti-malware, intrusion detection, etc. Examples: Cloudflare, FireEye, SonicWall.

    Mobile Device Connection Methods

    • Cellular: Wireless connection to transceivers in fixed locations across the world. Used primarily by mobile phones for voice and text, but also data. Uses transport encryption, but users have little control over security.
    • Wi-Fi: Wi-Fi networks provide local area connections for mobile devices. Can incorporate encryption and authentication if using secure protocols. Organizations have more control over Wi-Fi than cellular. Wireless technology primarily used for short-range communications.
    • Bluetooth: Example: Wireless headset connected to a nearby smartphone. Susceptible to bluejacking and bluesnarfing. Wireless communication in very close proximity.
    • NFC: Used primarily for in-person data exchange. Susceptible to BE signal interception and DoS flooding.

    Mobile Device Management

    • The process of tracking, controlling, and securing an organization's mobile infrastructure.
    • MDM solutions are often web-based platforms with a centralized console. You can enforce security on all mobile devices at once, rather than individually.

    Mobile Device Security Controls

    • Screen lock: Option should be enabled with strict requirements for unlock. Can only be accessed by code user has set.
    • Strong passwords and PINS: User should set up strong password/PIN for lock screen.
    • Full device encryption: Data on devices should be encrypted to protect sensitive data.
    • Remote wipe/lockout: Remote wipe: remotely delete sensitive data if device is lost or stolen. Remote lockout: remotely trigger lock screen if device is lost or stolen.
    • Geolocation and geofencing: Geolocation: tracking the geographic location of devices. Geofencing: creating geographic boundaries for device functionality. Uphold principle of least privilege.
    • Access controls: Consider context-aware authentication. Set restrictions on what apps/content user can access.
    • Application and content management: Consider blacklisting or whitelisting apps.

    Mobile Deployment Models

    • Corporate-owned: Organization is sole owner of devices and has full management control. Most secure. May be too strict to be feasible.
    • BYOD: Bring your own device-employees own and manage personal devices. Becoming increasingly common. Introduces security issues with new risks and questions of ownership.
    • CYOD: Choose your own device-employees choose from a vetted list of devices. Employee still in control of device. Tries to mitigate BYOD vulnerabilities but not be too strict.
    • COPE: Corporate-owned, personally enabled. Employees can still use devices for personal reasons. Organization still has some control, which can prompt privacy concerns.
    • VMI: Virtual mobile infrastructure—similar to VDI but for mobile OSes. Employees connect to VMs running mobile OSes. Organization retains control during work; employee regains control when outside of work.

    Software Development Lifecycle

    • The practice of developing software across a lifecycle from initial planning to final deployment and obsolescence.
    • Each developed app goes through distinct phases of this lifecycle.
    • You must integrate security into each phase of the lifecycle.

    Secure Coding Techniques

    • Limiting dead code: Code that executes but produces results not used by app. Remove dead code to minimize risk.
    • Server-side vs. client-side: Server side should validate input and execute code not meant for user. Client side should handle execution of GUI-based code.
    • Limiting data exposure: Limit how much data the app exposes to users. Especially important in systems that provide access to multiple users.
    • Memory management: Some languages manage memory automatically (Python, Java, etc.). Some languages require manual management (C, C++, etc.).
    • Stored procedures: Pre-compiled database statements used for input validation. Deny user access to underlying data.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on key concepts in cybersecurity, virtualization, and embedded systems. This quiz covers essential topics such as anti-malware software, virtual machines, and cloud services. Perfect for anyone looking to strengthen their understanding of digital security.

    More Like This

    Use Quizgecko on...
    Browser
    Browser