8.2.3 Mitigation processes

Cards (73)

  • Name 6 ways threats can mitgated against that are in software and hardware?
    Air gapping
    Access control
    Authentication
    Firewalls
    Access levels
    Device hardening
  • What is air gapping, and what is a good factor of it?
    System is seperate from a network, therefore cannot be accessed from outside physical premises

    No recurring costs
  • Air gapping protects against what kind of threats?
    External
  • Anti-virus protects against malware, what are the two main types of detection?
    Heuristic and signature
  • Signature anti-virus does what?
    Searches for known signatures in files to find malware
  • Heuristic anti-virus does what?
    Monitors program behaviour to detect malware-like activity
  • What options do antivirus offer once malware has been detected?
    Quarantine
    Delete
    Ignore
  • Software should be kept up to date to reduce security issues, however what software is very important to update for security?
    Security software
  • Automatic updates are useful as they reduce risk of human error regarding not updating it
  • AUtomatic updates may pose a risk as a Advanced Persistent Threat could potentially prevent an update
  • Manual updating 3 issues?
    Longer time to download
    Patch release isn't newest
    Prevented by incorrect scheduling
  • Why do some users like to update manually?
    To check what the update contains
  • API certification falls into 3 types?
    Private(5/5) - for internal use
    Partner(4/5) - for use with others, as safe as it's weakest link
    Public(2/5) - available to all users, can be exploited
  • Access controls is best to mitgate which kind of threat?
    Internal
  • Access controls involve predefining access of employees, what does it require?
    Clear documentation and accurate authentication and verification of identity
  • Good access controls systems have what key feature?
    Reports to identify which employees have accessed what
  • Access control can be implemented in l and physically
  • Physical access control often involves physical barriers that are opened using tokens unique to the employee
  • An employees unique token can even be something physical such as a key. However this does provide less info such as reports compared to tokens that can be integrated into smart tech such as RFID which can log who enters
  • Name 4 unique tokens aside from a key?
    RFID badge
    Password
    Magstripe card
    Biometrics
  • It is good to include other forms of physical security with access control, name 3 other forms?

    Surveillance
    Metal detectors
    Embedded wires
  • Digital unique tokens for physical access control can be prevented from working instantly
  • Device hardening reduces what of a system?
    Vulnerabilities
  • 4 ways to harden a device?
    Safe mode
    Automatic security patches
    Software access controls
    Disable unused ports
  • Encryption reduces the impact of data theft, as even once taken it cannot be used until decrypted, therefore reducing the effect of a data breach
  • What forms of data need to be encrypted the most?
    Data in transit
  • What form of data needs to be encrypted the least in controlled systems?
    Data in use
  • What are the two types of encryption?
    Asymmetric
    Symmetric
  • Assymetric encryption is?
    Encryption which has a different encryption and decryption key
  • Asymmetric encryption requires what?
    DIfferent encryption from decryption
  • Encryption is reversible as anything that is encrypted can be decrypted with the correct key
  • It is implausible that you can unscramble a hash, as the algorithm is intrinsically one-way as multiple hashes can have the same value
  • Access levels can be physical or logical
  • 3 examples of logical access levels?
    Usernames
    Password
    Verification
  • Username access controls:
    Usernames can be used to give access depending on the associated
  • Passwords prevent unauthorised access to digital systems
  • Passphrases are generally made up of multiple words, making them especially difficult to brute force due to it's length
  • Passphrases can be easier to remember reducing chance to forget
  • Multi-factor authentication can take many forms such as?
    Possession
    Location
    Knowledge
    Biometric
  • Token authentication uses physical items to verify a users identity