host - Answers any device with an IP address
host hardening - Answers the process of protecting a host against attacks (i.e. backing up, restricting
physical access, install secure configuration options, minimize number of apps and OS services running
on the host)
back up - Answers host hardening, without this nothing else matters:
physical access - Answers host hardening; restrict _______________________ ____________ to the
host
secure configuration options - Answers host hardening; install the operating system in a manner that
ensures default passwords are replaced with strong passwords
applications, services - Answers host hardening; minimize the number of ______________ and
operating system ___________ that run on the host to reduce the ability of hackers to take over the
host.
some attacks inevitably reach host computers; servers installed out of the box have vulnerabilities;
hackers can take them over very quickly - Answers the problems that require servers and host to be
hardened
servers, clients, routers - Answers common hosts
applications - Answers harden all ____________ on the host
patches - Answers download and install _________ for known operating system vulnerabilities
users, groups - Answers manage _________ and _____________
permissions - Answers manage access ____________ for users and groups separately
encrypt - Answers _______________ data if appropriate
firewall - Answers add a host _________________
logs - Answers read operating system ____________ regularly to look for suspicious activities
vulnerability tests - Answers run ______________________ against the system regularly to identify
security weaknesses that were not caught in the normal course of installation or operation
security baselines - Answers set of specific actions to be taken to harden all hosts of a particular type
and of particular versions within each type
disk images - Answers full copies of installations
, disk images - Answers saves money on computer installations and ensures each server is properly
configured to the firm's security baselines and general security policies
security baselines - Answers specifications for how hardening should be done
systems administrators - Answers server administrators are called
implement security baseline actions - Answers systems adminstrators
uniformity in hardening - Answers security baselines help to ensure
network administration - Answers systems administrators are not usually responsible for
virtual disk images - Answers can be deployed across a variety of hardware platforms using virtualization
virtualization - Answers allows multiple operating systems with their associated applications and data to
run independently on a single physical machine
virtual machines - Answers run their own operating system and share local system resources
allows systems administrators to create a single security baseline for each server (or remote client)
within the organization; minimizes chances of incorrect configurations; eliminates need to install
applications, patches or service packs; reduces labor costs and utility expenses - Answers benefit of
virtualization
systems administrators - Answers IT employees who manage individual hosts or groups of hosts
cloud computing - Answers uses processing power, applications, data storage and other services over
the internet
software as a service (SaaS) - Answers "on-demand software" is a delivery model in which software and
its associated data are hosted in the cloud and accessed using a web browser
thin clients - Answers essentially a screen, keyboard and connection to the mainframe
mainframe - Answers where all application processing occurs and data is stored
stand-alone clients - Answers CPUs, hard disks and applications (aka personal computers)
reduced costs, reliability, disaster recovery, data loss, scalability, agility, accessibility - Answers
advantages of cloud computing include
using a third party service provider, trust, compliance - Answers corporations have been slow to adopt
cloud computing because
Windows Server - Answers Microsoft's server operating system, security has improved over time
(firewalls, encryption, minimize number of running applications, etc.)