PKI
Public key infrastructure
What does a PKI do?
A mechanism for granting and validating certificates. It is made up of certificate authorities (CAs).
CA
Certificate authorities
What is a CA?
Is an entity trusted to issue, store, and revoke certificates
RADIUS and TACACS+
Protocols used for centralized authentication, authorization, and accounting with remote access.
Kerberos
Is an authentication and authorization program that uses tickets
Hybrid cryptosystems?
Combines the strengths of both symmetric and asymmetric encryption to encrypt data efficiently and securely
In hybrid cryptosystems
The public key is used to encrypt the symmetric key, this encrypted symmetric key is then sent to the receiver who uses their private key to decrypt it. The decrypted symmetric key is then used for data encryption and decryption
RA
Registration authority
What does a RA do?
Accepts registrations, validates identity
What best describes compensating controls?
Are a partial control solution that is implemented when a control cannot fully meet a requirement
What best describes detective controls?
Monitor network activity and inform the security team of a potential security event
What best describes corrective controls
Attempt to fix any controls that aren’t working properly
What best describes deterrent controls?
Discourage malicious actors from attempting to breach a network
Organizational unit
Logical organization of resources
Domain
Collection of network resources
Forest
Collection of related domain trees
Object
Network resource in the directory
Tree
Group of related domains that share the same continuous DNS namespace