What vulnerability exists with anti-virus/malware software?
Relies on known code signatures to detect malware and attackers have figured out ways to bypass this detection
Define Endpoint Detection & Response (EDR) and capabilities it provides
Define Data Loss Prevention (DLP) (2)
Define NGFW (2)
Define HIPS (2)
Define HIDS - Host-based Intrusion Detection System
Secondary system that monitors log files for intrusions and can reconfigure host protection to block those
3 reasons to use Host-based Firewall
What protections does UEFI BIOS provide, relative to the BIOS software?
Uses manufacturer’s public key to prevent malicious BIOS updates
4 steps of the UEFI Secure Boot Process
What does the secure boot process verify?
Verifies that the digital signature of the bootloader matches with the digital signature of the OS to ensure that the bootloader hasn’t been tampered with
What 3 things are verified during the trusted boot process?
What occurs during the measured boot process?
Generates a hash from all the files loaded in the secure and trusted boot processes that can be compared against the same hash that is stored in the TPM
What is boot attestation? (2)
Define hardware root of trust
Using physically installed hardware as the basis of trust in a system since unlike software, it can only be modified by physically accessing it
TPM - Trusted Platform Module provides (3):
Is the TPM password vulnerable to brute force attacks and why?
No, it has anti-brute force mechanisms that prevent these attacks
Define tokenization, relative to database security
Provides database security, instead of storing sensitive information, like a credit card #, a token is stored. The token is temporary and discarded after being sent to the transaction entity to complete the purchase.
Define how hashing can provide database security
Instead of storing the actual value in the database, a hash of the value is stored preventing compromise of the database revealing sensitive information
Define how salt can be used to enhance database security
Salting hashed values stored in the database complicates brute-force attacks, such as preventing the use of rainbow table attacks
Define fuzzing
Automated process to find input validation vulnerabilities in applications, can be used as part of QA or maliciously by an attacker
Define secure cookies
Cookies that are flagged and only allowed to transmitted via HTTPS by the browser
Define HTTP secure headers
Web servers can define restrictions of what is allowed in HTTP communications
Define SED & OPAL
Define DNS sinkhole
Creating alternate DNS entries for known malicious sites to an internal server for monitoring and access prevention