Skip to main content

Security hardening Wrap-up & Glossary terms from week 4

Great work on learning about security hardening!
Let's take a few minutes to wrap up what you've learned.

You learned about security hardening and its importance to an organization's infrastructure.
First, we discussed how security hardening strengthens systems and networks to reduce the likelihood of an attack.
Next, we covered the importance of OS hardening, including patch updates, baseline configurations,
and hardware and software disposal.
Then we explored network hardening practices, such as network log analysis and firewall rule maintenance.
Finally, we examined cloud network hardening and the responsibilities of both organizations and
cloud service providers in maintaining security.

As a security analyst, you'll be working with operating systems, on-premise networks, and cloud networks. 
You'll be using all the knowledge that we learned in this section in your career as a security analyst.


Terms and definitions from Course 3, Week 4

Baseline configuration (baseline image): A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

Hardware: The physical components of a computer

Multi-factor authentication (MFA): A security measure which requires a user to verify their identity in two or more ways to access a system or network

Network log analysis: The process of examining network logs to identify events of interest 

Operating system (OS): The interface between computer hardware and the user

Patch update: A software and operating system update that addresses security vulnerabilities within a program or product

Penetration testing (pen test): A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes 

Principle of least privilege: Access and authorization to information only last long enough to complete a task

Security hardening: The process of strengthening a system to reduce its vulnerabilities and attack surface

Security information and event management (SIEM): An application that collects and analyzes log data to monitors critical activities for an organization

World-writable file: A file that can be altered by anyone in the world