What is the definition of Mitigation?
The process of reducing the impact of a security event or a potential security event.
What is the purpose of patching known vulnerabilities?
Stops attacks before they happen by fixing known weaknesses.
What are the benefits of patching?
Name three sources of patches.
How does home system patching differ from organizational patching?
Home systems often patch automatically, while organizations test patches before deployment.
What are emergency patches?
Issued for significant vulnerabilities being actively exploited.
What is File-Level Encryption (EFS)?
Encrypts specific files or folders and is built into the operating system.
What is Full Disk Encryption (FDE)?
Encrypts an entire storage volume, including the operating system and user files.
When is Full Disk Encryption (FDE) especially critical?
For devices leaving the building or when there are concerns about physical access to storage drives.
What is Application-Level Encryption?
Applications encrypt data themselves, independent of file system or full disk encryption.
Why is constant monitoring and logging important?
To identify security events as they occur.
What technology consolidates logs from various sources?
Security Information and Event Manager (SIEM).
What is the principle of Least Privilege?
Assigning users only the rights and permissions necessary for their specific job role.
What is the goal of the principle of Least Privilege?
Minimize the potential impact of a compromised user account.
What is a best practice regarding user permissions?
Avoid users running with administrative permissions; elevate permissions temporarily when needed.
What is a Posture Assessment?
Enforces system configuration requirements for devices connecting to the network.
What actions can be taken for non-compliance in a Posture Assessment?
What is the importance of decommissioning equipment safely?
Removing sensitive information from devices at the end of their usable lifetime.
What are two methods for data removal from storage drives?
What is the role of SIEM in cybersecurity?
Consolidates logs from various sources into a central location for reporting and monitoring.
What does encryption do?
Converts information or data into a code to prevent unauthorized access.
What is the function of EFS?
Microsoft’s file-level encryption feature integrated into the Windows operating system.
What is BitLocker?
Microsoft’s full disk encryption feature for Windows operating systems.
What is FileVault?
Apple’s full disk encryption feature for macOS operating systems.