Endpoint Security - CompTIA Security+ SY0-701 - 4.5

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Device Posture check

- Is it a trusted device - is it running anti-virus? which one? Is it updated? - Are the corporate applications installed? - Is it a mobile device? Is the disk encrypted? - The type of device doesn't matter - windows, Mac, iOS etc

Edge Security

- Your internet link - Managed primary through firewall riles - Firewall rules rarely change

Endpoint Detection and Response (EDR)

A different method of threat protection - Scale to meet the increasing number of threats Detect a threat - Signatures aren't the only detection tool - Behavior analysis, machine learning, process monitoring - lightweight agent on the endpoint Investigate the threat - Root cause analysis Respond to the threat - Isolate the system, quarantine the threat, rollback to a previous configuration - API driven, no user or technician intervention required

Agentless NAC

A network access control (NAC) agent that is not installed on an endpoint device but is embedded within a Microsoft Windows Active Directory domain controller.

Endpoint Security

A set of security procedures and technologies designed to restrict network access at a device level. The users access - Application and data Stop the attackers - Inbound and outbound attacks Many different platforms - mobile, desktop Protection is multi-faced - defense in depth

persistent agent

Agent software that is permanently installed on a device and that can provide robust security measures such as remote wipe, virus scanning, and mass messaging.

Dissolvable Agent

Agent software that remains on a device long enough to verify compliance and complete authentication, and then uninstalls. Devices might be required to periodically reinstall the agent to complete the authentication process again.

Extended Detection and Response (XDR)

An evolution of EDR - Improve missed detection's, false positives, and long investigation times - Attacks involve more than just the endpoint Add network based detection - Investigate and respond to network anomalies Correlate endpoint, network, and cloud data - Improve detection rates - Simplify security events investigations

Access Control

Control from wherever you are - Inside or outside Access can be based on many rules - By user, group, location, application, etc Access can be revoked or changed easily - Changing security posture at anytime

User Behavior Analytics (UBA)

XDR commonly uses this - Extend the scope of anomaly detection Watch users, hosts, network traffic, data repositories, etc - Create a baseline or normal activity - Requires data analysis over an extended period Watch for anything unusual - Use a set of rules, pattern matching, statistical analysis

posture assessment

assesses cyber risk posture and exposure to threats caused by misconfiguration and patching delays


Kaugnay na mga set ng pag-aaral

Chapter 36: Management of Patients with Musculoskeletal Disorders

View Set

USMLE Step 2 CK Medical Subject Review: Internal: Diseases of the Heart and Blood Vessels

View Set

Ch. 15- Strategic Pricing Methods (guide)

View Set

Research Methods; Ch. 15: APA style & format

View Set

Life Insurance Basics / Life Insurance

View Set

Week 6 Check Your Understanding Assignment

View Set