\what are the security processes (AAA)
authentication
authorisation
accounting
authentication def
(deploys robust MFA multi-factor authentication process to) verify that users are who they claim to be
authorisation
(deploy processes to) verify that users have permission to access/modidfy the resources they are attempting to access/modify
accounting
authentication methods
firewall (authorisation)
eg of how firewall works
IDS (intrusion detection system)
device/software app that monitors network/systems for malicious activity/policy violations
BUT (unlike firewall)
IDS X prevent possible intrusions, only signals an alarm upon detection
IPS (intrusion protection system)
system that actively takes steps to prevent an intrusion/atk when it identifies one
why IPS > firewall
asymmetric key encryption (cryptography) purpose
ensures only intended recipient of msg can read it
digital signature
(context: how to ensure data transmitted is secure against cyber threats)
transport/socket layer security (TSL/SSL)
(context: how to ensure data transmitted secure against cyber threats)
explain how digital signature works
(context: explain what sending and receiving devices can do to detect any malicious alteration of a message, 4m)
(‘visualisation’)
sender
message hash = hash(message)
digital signature = encrypt(message hash, sender’s private key)
digital signature + org message (sent)
recipient
decrypted digital signature = decrypt(digital signature, sender’s public key)
message hash = hash(message)
verify that decrypted digital signature == message hash (same)