Podcast
Questions and Answers
What is a primary concern regarding the security of smart devices?
What is a primary concern regarding the security of smart devices?
What is a virtual machine?
What is a virtual machine?
Which type of hypervisor runs directly on the host's hardware?
Which type of hypervisor runs directly on the host's hardware?
What is a key advantage of virtualization?
What is a key advantage of virtualization?
Signup and view all the answers
How does security vary in special-purpose systems?
How does security vary in special-purpose systems?
Signup and view all the answers
What is the primary purpose of anti-malware software?
What is the primary purpose of anti-malware software?
Signup and view all the answers
Which type of anti-malware can actively monitor system for signs of virus activity?
Which type of anti-malware can actively monitor system for signs of virus activity?
Signup and view all the answers
Which of the following is a function of anti-spam filters?
Which of the following is a function of anti-spam filters?
Signup and view all the answers
Embedded systems often have which characteristic compared to PCs or servers?
Embedded systems often have which characteristic compared to PCs or servers?
Signup and view all the answers
Which of the following statements is true about anti-malware applications?
Which of the following statements is true about anti-malware applications?
Signup and view all the answers
What is one of the roles of external auditors in an organization's security compliance?
What is one of the roles of external auditors in an organization's security compliance?
Signup and view all the answers
A pop-up blocker primarily prevents which of the following?
A pop-up blocker primarily prevents which of the following?
Signup and view all the answers
Which of these is NOT a function of an embedded system?
Which of these is NOT a function of an embedded system?
Signup and view all the answers
What is a characteristic of a Type I hypervisor?
What is a characteristic of a Type I hypervisor?
Signup and view all the answers
Which cloud deployment model allows multiple entities to share ownership?
Which cloud deployment model allows multiple entities to share ownership?
Signup and view all the answers
What is the main feature of public cloud services?
What is the main feature of public cloud services?
Signup and view all the answers
What does cloud computing primarily rely on?
What does cloud computing primarily rely on?
Signup and view all the answers
Which of the following best defines Software as a Service (SaaS)?
Which of the following best defines Software as a Service (SaaS)?
Signup and view all the answers
In which type of cloud model does an organization maintain a dedicated network?
In which type of cloud model does an organization maintain a dedicated network?
Signup and view all the answers
What is a common concern for services traversing the Internet?
What is a common concern for services traversing the Internet?
Signup and view all the answers
Which type of hypervisor is considered to have more efficient resource management?
Which type of hypervisor is considered to have more efficient resource management?
Signup and view all the answers
What is the primary goal of limiting dead code in application development?
What is the primary goal of limiting dead code in application development?
Signup and view all the answers
What should server-side code primarily focus on according to secure coding techniques?
What should server-side code primarily focus on according to secure coding techniques?
Signup and view all the answers
Why is limiting data exposure particularly critical in multi-user systems?
Why is limiting data exposure particularly critical in multi-user systems?
Signup and view all the answers
In which programming languages is memory management typically handled manually?
In which programming languages is memory management typically handled manually?
Signup and view all the answers
What is the purpose of using stored procedures in secure coding practices?
What is the purpose of using stored procedures in secure coding practices?
Signup and view all the answers
What is a feature of Platform as a Service (PaaS)?
What is a feature of Platform as a Service (PaaS)?
Signup and view all the answers
Which of the following best describes Infrastructure as a Service (IaaS)?
Which of the following best describes Infrastructure as a Service (IaaS)?
Signup and view all the answers
What type of connection does Wi-Fi primarily provide?
What type of connection does Wi-Fi primarily provide?
Signup and view all the answers
What is the main benefit of using a strong password or PIN for a device's lock screen?
What is the main benefit of using a strong password or PIN for a device's lock screen?
Signup and view all the answers
Which deployment model provides employees with ownership and management of their devices?
Which deployment model provides employees with ownership and management of their devices?
Signup and view all the answers
Which of the following is a notable risk associated with Bluetooth technology?
Which of the following is a notable risk associated with Bluetooth technology?
Signup and view all the answers
What does geofencing enable organizations to do?
What does geofencing enable organizations to do?
Signup and view all the answers
How do MDM solutions typically function within an organization?
How do MDM solutions typically function within an organization?
Signup and view all the answers
What is a potential risk associated with the BYOD deployment model?
What is a potential risk associated with the BYOD deployment model?
Signup and view all the answers
What advantage does Screen Lock provide as a mobile device security control?
What advantage does Screen Lock provide as a mobile device security control?
Signup and view all the answers
During which phase of the Software Development Lifecycle is security integration important?
During which phase of the Software Development Lifecycle is security integration important?
Signup and view all the answers
Which of the following best describes the primary use of Near Field Communication (NFC)?
Which of the following best describes the primary use of Near Field Communication (NFC)?
Signup and view all the answers
What type of service does Security as a Service (SECaaS) primarily provide?
What type of service does Security as a Service (SECaaS) primarily provide?
Signup and view all the answers
What is the primary aim of implementing access controls based on the principle of least privilege?
What is the primary aim of implementing access controls based on the principle of least privilege?
Signup and view all the answers
What does remote wipe functionality allow an organization to do?
What does remote wipe functionality allow an organization to do?
Signup and view all the answers
In the context of the CYOD model, what is the employees' role regarding the devices?
In the context of the CYOD model, what is the employees' role regarding the devices?
Signup and view all the answers
Study Notes
Implementing Host and Software Security
- Implement Host Security
- Implement Cloud and Virtualization Security
- Implement Mobile Device Security
- Incorporate Security in the Software Development Lifecycle
Hardening
- The security technique of altering a system's configuration to close vulnerabilities and protect the system against attack.
- Typically implemented so systems conform to security policy.
- Many different techniques are available.
- Hardening may also restrict a system's capabilities.
- Hardening must be balanced against accessibility.
Operating System Security
- Each OS has unique vulnerabilities for attackers to exploit.
- Different OS types and OSes from different vendors have their own weaknesses.
- Vendors try to correct vulnerabilities while attackers try to exploit them.
- Stay up-to-date with security info posted by vendors and other references.
- Different types of OSes:
- Network
- Server
- Workstation
- Appliance
- Mobile
Operating System Hardening Techniques
- Implement a principle of least functionality.
- Disable unnecessary network ports.
- Disable unnecessary services.
- Take advantage of secure configurations.
- Disable default accounts.
- Force users to change default passwords.
- Implement a patch management service.
Trusted Computing Base
- The hardware, firmware, and software component responsible for ensuring computer system security.
- Trusted operating system: Operating systems that fulfill security requirements as in a TCB.
Hardware and Firmware Security
- BIOS/UEFI: Basic Input/Output System and Unified Extensible Firmware Interface. Both firmware interfaces to initialize hardware for system boot. UEFI is more modern and secure.
- Root of trust and HSM: Root of trust enforces trusted computing through encryption. Hardware security module is a physical device that implements root of trust.
- TPM: Trusted Platform Module. Secure cryptoprocessor that generates keys for use in TCB. Secure boot is a UEFI feature that prevents malicious processes from executing during boot. Cryptographic hash taken of boot loader to ensure integrity. TPM can sign hash for third-party verification (remote attestation).
Security Baselines
- A collection of host security settings.
- Compare the baseline to the security settings of hosts in your network.
- Baselines are crucial for streamlining the host hardening process.
- Don't harden hosts in a vacuum; use the baseline as a security template.
- Each baseline will differ based on the computer's function and operating system.
Software Updates
- Patch: Small unit of code meant to address a security problem or functionality flaw.
- Hotfix: A patch issued on an emergency basis to address a specific security flaw.
- Rollup: A collection of previously issued patches and hotfixes.
- Service pack: A large compilation of system updates that can include functionality enhancements and any prior patches, hotfixes, and rollups.
Application Blacklisting and Whitelisting
-
Blacklisting: Preventing the execution of all apps that are on a list of unauthorized apps.
- Drawback: You can't block malicious apps you haven't identified.
-
Whitelisting: Preventing the execution of all apps that aren't on a list of authorized apps.
- Drawback: Creation and maintenance of list increases overhead.
Logging
- The process of an operating system or application recording data about activity on a computer.
- Logs stored as text files with varying levels of detail.
- Highly detailed logging can consume excessive storage space.
- Logs can reveal information about a suspected attack.
- Restrict access to logs and back them up routinely.
Auditing
- Performing an organized technical evaluation of a system's security to ensure it is in compliance.
- Similar to a security assessment.
- Auditing is focused more on ascertaining if the system meets a set of criteria.
- Criteria come from laws, regulations, standards, and organizational policy.
- Most audits are performed by third parties.
- Example: External auditor checks to see if online merchant is in compliance with PCI DSS.
- Commonly associated with reviewing log files.
- Can also test passwords, scan firewalls, review user permissions. Audits contribute to the overall hardening process.
Anti-malware Software
- Software that scans systems and networks for malicious software.
- Most scan for known malware.
- Some can scan for unknown malware.
- Install anti-malware on all computers.
- Keep anti-malware apps updated.
Types of Anti-malware Software
- Antivirus: Scans for code matching virus patterns (signature-based). Can actively monitor system for virus activity (behavior-based or heuristic).
- Anti-spam: Anti-spam filters detect key words used in spam messages. Can also block based on IPs of known spam sources. Functionality may come packaged with antivirus software.
- Anti-spyware: Designed specifically to identify and stop spyware.
- Pop-up blocker: Prevents websites from popping up elements in the browser. Most browsers include this functionality.
- Host-based firewalls: Not specifically designed for anti-malware. Can still block network traffic used by malware.
Embedded Systems
- Hardware and software systems that have a specific function within a larger system.
- Larger systems include everything from home appliances to industrial machines.
- Embedded systems are found in all kinds of technology and industries.
- Usually don't have the complexity of a PC or server.
- Their dedicated purpose often means less sophisticated architecture.
- May use an all-in-one microcontroller rather than discrete CPU/memory components.
- May not have a GUI.
- May still have an OS.
- Larger system may be user-friendly even if embedded system is not.
Security Implications for Embedded Systems
- Smart devices: Smart devices are electronic devices with network connectivity. Smart devices have autonomous computing properties. Security is an afterthought or not thought of at all.
- IoT: IoT devices are objects connected to the Internet. IoT devices use embedded electronic components. Like smart devices, security is very poor or non-existent.
- Camera systems: IP cameras are easier to manager than CCTV. Susceptible to standard networking risks. Can use encryption protocols to protect recorded data.
- Special purpose systems: Medical devices, ATMs, vehicles, etc. Security depends on purpose and functionality of systems.
Virtualization
- Virtualization: Creating a simulation of a computing environment.
- Simulates hardware and software.
- You create virtualized computers to run on physical computers.
- Example: Virtual Linux computer running on physical Windows
- Virtual machine: A virtualized computer.
- Advantages: Easier to manage, Cost-efficient, Power and resource-efficient.
Hypervisors
- The layer of software that separates the virtual software from the physical hardware it runs on.
- Manage resources on physical host and provide them to the virtual guests.
- Provide flexibility and increased efficiency of hardware use.
-
Two basic types:
- Type I: Run directly on host's hardware.
- Type II: Run as an application on top of host operating system.
Cloud Computing
- Computing involving real-time communication over large distributed networks to provide various resources to a consumer.
- Typically relies on the Internet.
- "The cloud" refers to resources available on a particular service. Examples: Business sites, consumer sites, storage services, etc.
- You can access and manage resources from anywhere.
- Storage method and location are not visible to the consumer.
- Cloud computing uses virtualization to provision resources.
Cloud Deployment Models
- Private: Usually distributed by a single entity over a private network. Enables entities to exercise greater controller over services. Geared toward banking and governmental services.
- Public: Done over the Internet offering services to general consumers. Pay-as-you-go subscriptions and lower-tier services for free.
- Community: Security is a concern for anything traversing the Internet. Multiple entities sharing ownership of a cloud service. Done to pool resources for a common concern.
- Hybrid: Combines two or more of the previous models. Example: Private cloud for internal personnel, public for customers.
Cloud Service Types
- Software (SaaS): SaaS uses cloud to provide apps to users. Eliminates installation and purchasing of specific versions. Examples: Office 365, Salesforce, G Suite.
- Platform (PaaS): PaaS provides virtual systems to customers. Can include operating systems and application engines. Examples: Oracle Database, Azure SQL Database, Google App Engine.
- Infrastructure (IaaS): laaS provides access to infrastructure needs. Includes data centers, servers, networking, etc. Examples: Amazon EC2, Azure VMs, OpenStack.
- Security (SECaaS): SECaaS provides resources for security purposes. Includes authentication, anti-malware, intrusion detection, etc. Examples: Cloudflare, FireEye, SonicWall.
Mobile Device Connection Methods
- Cellular: Wireless connection to transceivers in fixed locations across the world. Used primarily by mobile phones for voice and text, but also data. Uses transport encryption, but users have little control over security.
- Wi-Fi: Wi-Fi networks provide local area connections for mobile devices. Can incorporate encryption and authentication if using secure protocols. Organizations have more control over Wi-Fi than cellular. Wireless technology primarily used for short-range communications.
- Bluetooth: Example: Wireless headset connected to a nearby smartphone. Susceptible to bluejacking and bluesnarfing. Wireless communication in very close proximity.
- NFC: Used primarily for in-person data exchange. Susceptible to BE signal interception and DoS flooding.
Mobile Device Management
- The process of tracking, controlling, and securing an organization's mobile infrastructure.
- MDM solutions are often web-based platforms with a centralized console. You can enforce security on all mobile devices at once, rather than individually.
Mobile Device Security Controls
- Screen lock: Option should be enabled with strict requirements for unlock. Can only be accessed by code user has set.
- Strong passwords and PINS: User should set up strong password/PIN for lock screen.
- Full device encryption: Data on devices should be encrypted to protect sensitive data.
- Remote wipe/lockout: Remote wipe: remotely delete sensitive data if device is lost or stolen. Remote lockout: remotely trigger lock screen if device is lost or stolen.
- Geolocation and geofencing: Geolocation: tracking the geographic location of devices. Geofencing: creating geographic boundaries for device functionality. Uphold principle of least privilege.
- Access controls: Consider context-aware authentication. Set restrictions on what apps/content user can access.
- Application and content management: Consider blacklisting or whitelisting apps.
Mobile Deployment Models
- Corporate-owned: Organization is sole owner of devices and has full management control. Most secure. May be too strict to be feasible.
- BYOD: Bring your own device-employees own and manage personal devices. Becoming increasingly common. Introduces security issues with new risks and questions of ownership.
- CYOD: Choose your own device-employees choose from a vetted list of devices. Employee still in control of device. Tries to mitigate BYOD vulnerabilities but not be too strict.
- COPE: Corporate-owned, personally enabled. Employees can still use devices for personal reasons. Organization still has some control, which can prompt privacy concerns.
- VMI: Virtual mobile infrastructure—similar to VDI but for mobile OSes. Employees connect to VMs running mobile OSes. Organization retains control during work; employee regains control when outside of work.
Software Development Lifecycle
- The practice of developing software across a lifecycle from initial planning to final deployment and obsolescence.
- Each developed app goes through distinct phases of this lifecycle.
- You must integrate security into each phase of the lifecycle.
Secure Coding Techniques
- Limiting dead code: Code that executes but produces results not used by app. Remove dead code to minimize risk.
- Server-side vs. client-side: Server side should validate input and execute code not meant for user. Client side should handle execution of GUI-based code.
- Limiting data exposure: Limit how much data the app exposes to users. Especially important in systems that provide access to multiple users.
- Memory management: Some languages manage memory automatically (Python, Java, etc.). Some languages require manual management (C, C++, etc.).
- Stored procedures: Pre-compiled database statements used for input validation. Deny user access to underlying data.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on key concepts in cybersecurity, virtualization, and embedded systems. This quiz covers essential topics such as anti-malware software, virtual machines, and cloud services. Perfect for anyone looking to strengthen their understanding of digital security.