Operating System Security Measures

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

The ASD top four measures for prevention are: ______ approved applications, Patch third-party applications and OS vulnerabilities, Restrict admin privileges to users who need them, Create a defense-in-depth system

White-list

The first step in deploying a new system is ______ planning

System Security

The planning process needs to determine ______ requirements for the system, applications, data, and users

security

Default configurations for many operating systems often maximizes ______ of use and functionality, rather than security

<p>ease</p> Signup and view all the answers

Second step is a very critical step in securing a system is to secure the ______ OS

<p>base</p> Signup and view all the answers

Devices ______ enabled, servers ______ enabled, ……..

<p>is, is</p> Signup and view all the answers

An operating system is a set of programs designed to run other programs on a ______.

<p>computer</p> Signup and view all the answers

The security of an OS depends on how the system is being ______ and maintained.

<p>monitored</p> Signup and view all the answers

Each layer is vulnerable to attack from below if the lower layers are not ______ properly.

<p>secured</p> Signup and view all the answers

OS Hardening is the process of adding extra security measures to your operating system in order to ______ it against the risk of cyber attacks.

<p>strengthen</p> Signup and view all the answers

The 2010 Australian Defense Signals Directorate (ASD) lists the “Top 35 ______ Strategies”.

<p>Mitigation</p> Signup and view all the answers

Over 70% of the targeted cyber intrusions investigated by ASD in 2009 could have been prevented by the top four ______.

<p>measures</p> Signup and view all the answers

Identify what is required for a particular system during the ______ phase

<p>Planning</p> Signup and view all the answers

The ______ should be kept up to date with all critical security related patches installed.

<p>system</p> Signup and view all the answers

Removing ______ services, applications, and protocols reduces attack surface.

<p>unnecessary</p> Signup and view all the answers

Configure ______ to operate with minimum permissions.

<p>users</p> Signup and view all the answers

Install and configure ______ controls, such as anti-virus and host-based firewalls.

<p>additional security</p> Signup and view all the answers

The third step is to secure ______ and services.

<p>Apps</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Operating System Security Measures
18 questions
Operating System Security Hardening
15 questions
Use Quizgecko on...
Browser
Browser