Course Hero Logo

Day4 Presentation.pptx - Security+ Session 4 Thursday,...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 21 out of 267 pages.

1Security+ Session 4Thursday, August 15, 2019
Client & applicationsecurity
Client and Application SecurityHaving a secure network is essential to a comprehensive informationsecurity postureYet attacks invariably make their way past network defensesThis means that protecting individual devices is also essential.Aclientis a computing device that has software to enable it to sendrequests to serversAhost, on the other hand, is any end device in a network
Client andApplicationSecurityClient SecurityPhysical SecurityApplication Security
Client & applicationsecurityClient Security
Client SecurityHardware systemsecurity1Securing theoperating system2Peripheral devicesecurity3
Hardware System Security.Secure bootingBIOS(Basic Input/Output System)UEFI(Unified Extensible Firmware Interface)Secure BootHardware root of trust
Hardware System Security.Supply chain
Client SecurityHardware systemsecurity1Securing theoperating system2Peripheral devicesecurity3
Types of Operating Systems.Network OSServer OSWorkstation OSAppliance OSKiosk OSMobile OS
Operating System SecurityConfigurationsDisabling unnecessary ports and services- “Turning off” any service that is not beingusedMicrosoft Windows ASP.NET State ServicePortable Device Enumerator ServiceApple macOS Spotlight IndexingAny unnecessary TCP portsDisabling default accounts/passwords- Some OSs include unnecessary accountsMicrosoft Windows 10 includes abuilt-in Administrator accountthat can be used forthose building new computers to run programs and applications before a useraccount is createdIn addition, some accounts may come with default passwords that should be changed
Operating System SecurityConfigurationsLeast functionality- User should only be given the minimum set ofpermissions required to perform necessary tasks; all otherpermissions should be configured as not available to the userApplication whitelisting/blacklistingWhitelistingis approving in advance only specific applications to run on theOS so that any item not approved is either restricted or denied (“default-deny”)Blacklistingis creating a list of unapproved software so that any item not onthe list of blacklisted applications can run (“default-allow”)
Operating System SecurityConfigurations

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 267 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture