-
Logical security concepts:
- Microsoft Active Directory - centralized management; uses Organizational Units.
- Mobile Device Management (MDM) - set policies on apps, data, etc.
- Port security
- Certificate-based authentication
- Anti-virus and anti-malware
- Firewalls - host-based and network-based.
- Directory permissions
- VPN concentrator - Encrypt data traversing a public network.
- Data Loss Prevention (DLP)
- Access Control Lists (ACLs)
- Least privilege - permissions set to bare minimum.
-
Common types of malware:
- Ransomware
- Crypto-malware
- Trojan horse
- Spyware
- Keyloggers
- Rootkits
- Virus
- Worms
- Botnets
-
Anti-malware tools:
- Anti-virus and anti-malware
- Windows Recovery Environment
- End user education
- Firewalls
- Secure DNS
-
Social engineering principles:
- Authority
- Intimidation
- Social proof
- Scarcity
- Urgency
- Familiarity
- Trust
-
Social engineering types:
- Phishing
- Spear phishing (whaling)
- Impersonation
- Shoulder surfing
- Tailgating
- Dumpster diving
-
Denial of service - force a service to fail by overloading; using design failure or vulnerability.
-
DDoS (Distributed Denial of Service) - launch army of computers to bring down a service; uses botnets.
-
Mitigating DDos attacks - filter out traffic patterns; anti-DDoS systems.
-
Zero-day attacks - vulnerability not detected yet.
-
Man-in-the-middle attacks - using traffic redirection, ARP poisoning.
-
Mitigating MITM attacks - use encrypted protocols like HTTPS, SSH.
-
Brute Force attacks - keep trying the login process; slow; dictionary attacks; rainbow tables (doesn't work for salted hashes).
-
Spoofing - pretend to be something you aren't; MAC spoofing, IP address spoofing.