Define Least Privilege.
The practice of granting users the minimum necessary access rights to perform their job duties, preventing excessive permissions and reducing security risks.
Define Patch Management.
The systematic process of identifying software vulnerabilities or bugs and applying patches (fixes) to operating systems or applications to improve security and performance.
Define Endpoint Security.
Network security method where local security measures on every device (or endpoint) connected to a network are implemented (ie like antivirus, firewalls, and intrusion detection).
Goal: To protect each endpoint from threats and prevent them from becoming entry points for attackers into the network.
This includes protections like antivirus software, authentication and authorization mechanisms, local firewalls, and intrusion detection/prevention systems installed directly on each device to safeguard it independently from the broader network security controls.
Define Media access control (MAC) filtering.
A network security method that restricts access by allowing only devices with approved physical (MAC) addresses to connect.
MAC filtering works by creating a list of approved MAC addresses—these are unique hardware identifiers assigned to each network device (like your laptop or phone). The network’s access point (like a router or switch) checks the MAC address of any device trying to connect. If the device’s MAC address is on the approved list, it’s allowed access; if not, it’s blocked.
This method limits network access strictly to known devices, helping prevent unauthorized devices from connecting, even if they know the network password. However, MAC addresses can be spoofed, so MAC filtering is often used alongside other security measures for stronger protection.
Define Virtual Private Network (VPN).
Network security method:
Encrypts communications over public networks to provide secure remote access.
Define Network Isolation/Segmentation.
Network security method:
Separates network traffic into segments to limit access and contain breaches.
Define Firewalls.
Network security method:
Filter and monitor incoming/outgoing traffic based on rules to block malicious activity.
Define Wi-Fi Protected Access (WPA).
Network security method:
Encrypts wireless network traffic to secure Wi-Fi connections.
Define System Hardening.
Network security method:
Reduces attack surfaces by closing unused ports, removing unnecessary services, and enforcing strict permissions.
Define Access Controls.
Network security method:
Implement policies like least privilege, zero trust, and multifactor authentication to control who can access what.
Define Define Discretionary access control (DAC).
A security model where the data owner or creator has the authority to decide who can access their data or resources. The owner can grant or revoke permissions based on their own judgment, allowing them to control access flexibly.
In simple terms, with DAC, the person who owns the data gets to choose who else can see or use it, rather than having access controlled centrally by IT or based on fixed rules.
Define Policy-Based Access Control (PBAC).
Access control model that combines user roles with dynamic policies made up of rules to manage and evaluate user access in real time. It looks at various factors about a user—like their identity, role, clearance level, operational need, and risk—to decide what access they should have.
PBAC is more flexible than simple rule-based controls because it allows organizations to analyze and adjust theoretical privileges based on actual privileges users hold. This makes it ideal for growing organizations with changing policies and complex access needs.
Define Role-Based Access Control (RBAC).
A model that assigns access permissions based on a user’s job role within an organization. Instead of giving permissions to individuals, access is grouped by roles, and users get the permissions associated with their role. This helps ensure proper separation of duties and makes managing access easier, especially when people change positions.
Define Risk-Based Access Control (RBAC) .
An access control model that adjusts permissions based on the level of risk associated with the asset being accessed, the identity of the user, their intentions, and the security risk between the user and the system.
In practice:
- High-risk assets require stricter controls (like multifactor authentication).
- Low-risk assets might only need basic controls (like a password).
- Access decisions dynamically consider the potential impact on security.
What is a Turnkey system?
A system that is customized for a particular application and is fully functional without additional development work. The expression of “turnkey” is derived from the idea that a user can just turn a key and the system will be fully functional.
What is an Electronic lockbox?
A digital system that uses web addresses to receive and process electronic payments or forms, streamlining payment collection and processing for organizations.
What is an Electronic envelope?
A security mechanism that protects a message by combining data authentication and encryption to ensure confidentiality and integrity during transmission.
What is a Digital Signature?
An encrypted electronic mark that verifies a message or document is from an authentic sender and hasn’t been altered. It uses a private key to sign and a public key to verify, ensuring authenticity and integrity but not controlling access or delivery.
What is the difference between application-level programs and system-level systems?
Application-level programs serve users directly, while system-level programs control the computer’s fundamental operations.
Application-level programs:
User-focused software that performs specific tasks (e.g., browsers, word processors). They run on top of the operating system.
System-level programs:
Core software that manages hardware and system resources (e.g., operating system, device drivers). They operate closer to the hardware and support application programs.
What does Need-to-Know mean as it relates to IT security?
Users are granted access only to the specific data or information necessary to perform their job tasks, limiting exposure to sensitive information. It focuses on restricting data access rather than broader system permissions.
What is the difference between Need-to-Know and Least Privilege?
Need-to-Know = DATA access control
Least Privilege = SYSTEM access control
What is a circuit-level gateway?
A firewall that verifies the source of data packets at the session layer but does not share IP addresses among devices.
A firewall that verifies the source of data packets at the session layer but does not share IP addresses among devices is called?
Circuit-level gateway
What is a network address translation firewall?
A device that allows multiple devices on a private network to share a single public IP address by masking their true private addresses.