Security concepts 4.1 Flashcards

(34 cards)

1
Q

Data in transit

A

Data transmitted over network. Also called Data in motion. Can be encrypted with TLS or IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data at rest

A

Data on storage device. Usually data is encrypted on the disc, the database, or file level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PKI

A

Public key infrastructure, policies for public encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital certificate

A

Public key cert. Binds public key with a digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Certificate authority

A

Third party verifying a website’s certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Self-signed certificate

A

Internal to network certificate. “Build your own CA”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IAM

A

Identity and access management. Processes for manage data access with identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Least privilege

A

User should only have rights and permissions that they need, not anymore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Role based access control

A

Access control based on roles. Windows uses Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Geographic restriction

A

Network location based on IP address or geolocation. If it looks bad then ask for additional verification or locked out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AAA Framework

A

Authentication, authorization, accounting (keeping track of identity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Single Sign-on

A

Credentials given one time which gives access to all available resources. Limited by time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RADIUS

A

Common AAA management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LDAP

A

Protocol for reading and writing files over network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

x.500 distinguished name

A

Standardized attributes which can have assigned values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAML

A

Standard for authentication and authorization. Can’t be natively used on mobile devices

17
Q

TACACS

A

Terminal access controller access control system. Remote authentication protocol

18
Q

Multifactor authentication

A

Something you know/have/are/location

19
Q

TOTP

A

Time based one time password. Like steam authenticator

20
Q

Honeypots

A

For attracting hackers

21
Q

Honeynet

A

Honeypot network

22
Q

CIA triad

A

Confidentiality, integrity, availability

23
Q

Confidentiality

A

Prevent disclosure of info to unauthorized

24
Q

Integrity

A

Messages can’t be modified without detection

25
Availability
Network and systems stay up and running
26
Data localization
Laws may prohibit how or what kinds of data can be stored (ex: gdpr)
27
GDPR
EU data regulation; EU data must stay in the EU. Users can choose what sites keep their data, can request removal of data from search engines
28
PCI DSS
Credit card data protection. Protect data in motion, cardholder data, have vulnerability management program, access control measures, regular security testing, and have an info security policy
29
Segmentation enforcement
Physical, logical, or virtual separation due to performance, security, or compliance
30
IOT segmentation
IOT devices may be weak in security and should be segmented
31
SCADA/ICS
Supervisory control and data acquisition system; industrial control systems PC manages equipment, distributed control system. Completely segmented
32
Operational Technology
Industrial equipment like electric grids. Segmentation important.
33
Guest network
Network for visitors, keeps from important bits.
34
BYOD
Bring your own device. Employee brings own device, may have segmentation