Page 24 - Security+ (635 notes by Nikkhah)
P. 24

Honeypots

            383- A honeypot is a trap used to attract attacks on a network.

            384- It appears to be a critical server or part of a networkcontaining valuable information to the
            attacker.

            385- The attacker does not know that he is attacking a fake network site.

            386- It is used to test the intrusion detection systems and create attack signatures.



            Filesystems
            387- Filesystems allow administrators to grant need-based access to files and folders.

            388- Users are put into groups, and permissions are configured for groups.
            389- The principle of least privilege is applied when assigning permissions.

            390- The principle of least privilege restricts access to resources and prevents unauthorized

            access.



            Updates, hotfixes, and service packs
            391- Manufacturers release updates (service packs, hotfixes, and security patches) to address

            problems with their software.
            392- A hotfix is a small piece of software that is used to address a specific problem with the

            operating system.

            393- A service pack is a collection of a number of hotfixes and updates.
            394- Updates should be tested before they are installed.

            395- Administrators should checkmanufacturers’ web sites regularly for the release of updates.



            Network hardening

            396- Networkhardening locks down networkdevices to protect them from external and internal
            threats.

            397- Firmware of devices should be updated as and when necessary.
            398- Network devices should not be used with default configurations.

            399- Access  Control  Lists  (ACLs)  of  devices  should be  configured  to  prevent  unauthorized

            traffic.
            400- The  ACLs  can  be  configured  on  the  basis  of  interface,  port  numbers,  protocols, IP

            address, or MAC address.


                   www.hrnikkhah.com                        by :  Hamid  Reza  Nikkhah                 Page 22
   19   20   21   22   23   24   25   26   27   28   29