Data in transit
Data transmitted over network. Also called Data in motion. Can be encrypted with TLS or IPsec
Data at rest
Data on storage device. Usually data is encrypted on the disc, the database, or file level.
PKI
Public key infrastructure, policies for public encryption keys
Digital certificate
Public key cert. Binds public key with a digital signature.
Certificate authority
Third party verifying a website’s certificate
Self-signed certificate
Internal to network certificate. “Build your own CA”
IAM
Identity and access management. Processes for manage data access with identity
Least privilege
User should only have rights and permissions that they need, not anymore
Role based access control
Access control based on roles. Windows uses Groups
Geographic restriction
Network location based on IP address or geolocation. If it looks bad then ask for additional verification or locked out.
AAA Framework
Authentication, authorization, accounting (keeping track of identity)
Single Sign-on
Credentials given one time which gives access to all available resources. Limited by time
RADIUS
Common AAA management
LDAP
Protocol for reading and writing files over network
x.500 distinguished name
Standardized attributes which can have assigned values
SAML
Standard for authentication and authorization. Can’t be natively used on mobile devices
TACACS
Terminal access controller access control system. Remote authentication protocol
Multifactor authentication
Something you know/have/are/location
TOTP
Time based one time password. Like steam authenticator
Honeypots
For attracting hackers
Honeynet
Honeypot network
CIA triad
Confidentiality, integrity, availability
Confidentiality
Prevent disclosure of info to unauthorized
Integrity
Messages can’t be modified without detection