Please enable JavaScript.
Coggle requires JavaScript to display documents.
LESSON 12 IMPLEMENTING HOST SECURITY SOLUTIONS - Coggle Diagram
LESSON 12
IMPLEMENTING HOST SECURITY SOLUTIONS
12A Implement Secure Firmware
Hardware Root of Trust (RoT)
Boot Integrity
Secure Boot
Measured Boot
Boot Attestation
Disk Encryption
USB and Flash Drive Security
Third-Party Risky Management
End of Life Systems
Organizational Security Agreements
12B Implement Endpoint Security
Hardening
Baseline Configuration and Registry Settings
Patch Management
Endpoint Protection (EPP)
Antivirus (A-V)/Anti-Malware
HIDS/HIPS
Endpoint Protection Platform
Data Loss Prevention (DLP)
Endpoint Protection Deployment
Next-Generation Endpoint Protection
Endpoint Detection and Response (EDR)
Next-Generation Firewall Integration
Antivirus Response
Advanced Malware Tools
Sandboxing
12C Explain Embedded System Security Implications
Embedded Systems
Cost, Power, and Compute Constraints
Crypto, Authentication, and Implied Trust Constraints
Network and Range Constraints
Logic Controllers for Embedded Systems
System on Chips (SoC)
Field Programmable Gate Array (FPGA)
Real-Time OS (RTOS)
Embedded Systems Communications Considerations
Operational Technology (OT) Networks
Cellular Networks
Z-Wave and Zigbee
Industrial Control Systems
Workflow and Process Automation Systems
Supervisory Control and Data Acquisition (SCADA)
ICS/SCADA Applications
IoT
Specialized Systems for Facility Automation
Building Automation System (BAS)
Smart Meters
Surveillance Systems
Specialized Systems in IT
Multifunction Printers (MFPs)
VoIP
Specialized Systems for Vehicles and Drones
Specialized Systems for Medical Devices
Security for Embedded Systems
Network Segmentation
Wrappers
Firmware Code Control and Inability to Patch