Operating systems that have reached their _______ are typically not eligible to receive feature and security updates.
end-of-life (EOL). Every piece of technology will eventually become obsolete, and vendors use the term end-of-life (EOL) to refer to something that has reached the end of its useful life and consequently will no longer be sold, marketed, supported, or upgraded.
______________ is a mandatory component of Windows that aims to improve the security of systems by limiting the permissions that normal application software runs as, until authorized by an administrator.
User Account Control (UAC) functions by isolating low-privilege and high-privilege running processes and requiring administrator approval prior to an application’s privilege escalation.
Why are users strongly encouraged to utilize the 3-2-1 system when backing up crucial data?
It contains solid guidelines to help prevent against complete data loss. The 3-2-1 rule states that you should have 3 copies of your backed up data, across two or more media types (CD, DVD, USB), and at least one copy of your backup should be hosted offsite, such as in the cloud. Following this rule helps ensure that you always have a complete backup available no matter the reason for the outage.
Update
A patch, fix, or correction to existing version of OS.
Upgrade
When you move from one version of an OS to a newer one.
Patch Managment
Involves the identification and application of software updates on devices which can include servers, workstations, standalone PCs, Mobile Devices, many peripherals.
Patch
one or more changes to existing software. In most cases, patches correct known errors, vulnerabilities, flaws, can also include new features.
Delivery Optomization
allows updates to be retrieved from other PC on the network. Allows for the second PC to reduce update time by taking the already downloaded update from the first PC.
OS Update Failure
Failure notice message has an error code. Can be searched and find solution or cause of problem.
EOL
End-of-Life. Every piece of technology will eventually become obsolete, and vendors use the term end-of-life (EOL) to refer to something that has reached the end of its useful life and consequently will no longer be sold, marketed, supported, or upgraded.
MacOS Check for Software Update
Click Apple Menu -> System settings -> General -> Software Update. During Mac update cannot sleep or close lid, OS must stay open.
MacOS System Folders
MacOS system folders are initially hidden. Cannot be accessed through terminal or finder.
MacOS System Files - “/applications”
Holds the apps that display on the launch pad windows
MacOS System Files - “/Users”
Holds the home folder of any user with log in account on mac
MacOS System Files - “/Library”
Holds items used by various apps. Data, log in credentials, Etc.
MacOS System Files - “/System”
Holds MacOS and its files. Its folder and contents cannot be altered.
MacOS System Files - “/User/Library”
Holds personal settings, app data, caches, and preferences for a user.
Apple Malware defense best practice Layer 1
Malware scanning apps prevent execution of malware or viruses using gatekeeper app and apple notarization.
Apple Malware defense best practice Layer 2
x protect app remedies any malware that is able to execute.
RSRs
Rapid Security Resources. Provide security updates without waiting for next OS update. Provided as needed by apple.
apt (linux command):
etc/apt/sources.list
Command used to find the source list file which tells system where to look for updates
deb http://http.kali.org/kali kali-rolling Main contrib non-free non-free-fiirmware
Deb - Archive
http://http.kali.org/kali - mirror
kali-rolling - Branch
Main contrib non-free non-free-fiirmware - Components
deb
Debian-based package management system (deb)
Contrib (Linux Update Component)
Packages may depend on non-free software