Patch Management
Linux command line
retrieves updates
sudo apt-get upgrade
Patch management
Linux command line
installs updates
system hardening
locks down configurations
-removes unnecessary software and operating system components
-lock down host firewall configurations
-disable default passwords and accounts
-confirm Windows registry and linux configuration settings match best practices
signature detection
watches for known patterns of malware activity
behavior detection
watches for deviations from normal patterns of activity
Endpoint Detection and Response (EDR)
advanced real-time protection against malware and other security issues by using agents installed on
endpoint devices to watch for malicious activity
-analyze memory and processor use, registry entries, network communications and more
-Ex. Windows Defender
sandboxing
isolates malicious content
spam filtering
blocks unwanted email
malware logs
, ______ should be sent to a centralized system for storage and analysis.
application control
Restricts software that may run
-whitelisting and blacklisting
-GPO restrictions
- EX. Applocker
host software baselining
uses a standard list of the software that you expect to see on systems in your environment and then
reports deviations from that baseline
-identifies expected system software
network firewalls
hardware devices that regulate connections between two networks
-placed between the organizations network and the internet
host firewalls
Software components of an operating system that limit connections to a server
network and host
Granting network access requires configuring both _____ & _____ firewalls
Next Generation Firewall (NGFW)
incorporates advanced security features such as contextual information about the user and application
-IDS & IPS
Intrusion Detection System (IDS)
alerts administrators to suspicious network activity
Intrusion Prevention System (IPS)
takes a proactive measure to block suspicious network activity
file integrity monitoring
watches for unexpected file modifications
-periodically verifies that the hash values of critical files have not changed
- EX. Tripwire
Data Loss Prevention (DLP)
technology solutions that search systems and monitor networks for sensitive information that is insecure
and provide the ability to remove the information, block the transmission, or encrypt the stored data
Host-based DLP
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.