Page 24 - Security+ (635 notes by Nikkhah)
P. 24
Honeypots
383- A honeypot is a trap used to attract attacks on a network.
384- It appears to be a critical server or part of a networkcontaining valuable information to the
attacker.
385- The attacker does not know that he is attacking a fake network site.
386- It is used to test the intrusion detection systems and create attack signatures.
Filesystems
387- Filesystems allow administrators to grant need-based access to files and folders.
388- Users are put into groups, and permissions are configured for groups.
389- The principle of least privilege is applied when assigning permissions.
390- The principle of least privilege restricts access to resources and prevents unauthorized
access.
Updates, hotfixes, and service packs
391- Manufacturers release updates (service packs, hotfixes, and security patches) to address
problems with their software.
392- A hotfix is a small piece of software that is used to address a specific problem with the
operating system.
393- A service pack is a collection of a number of hotfixes and updates.
394- Updates should be tested before they are installed.
395- Administrators should checkmanufacturers’ web sites regularly for the release of updates.
Network hardening
396- Networkhardening locks down networkdevices to protect them from external and internal
threats.
397- Firmware of devices should be updated as and when necessary.
398- Network devices should not be used with default configurations.
399- Access Control Lists (ACLs) of devices should be configured to prevent unauthorized
traffic.
400- The ACLs can be configured on the basis of interface, port numbers, protocols, IP
address, or MAC address.
www.hrnikkhah.com by : Hamid Reza Nikkhah Page 22

