1.0 Network Security Flashcards
What does security mean?
Security is the degree of protection against danger, damage, loss, and criminal activity.
What does CIAN stand for?
CIAN stands for Confidentiality Integrity Availability Non-repudiation.
What are the steps of an attack?
Then steps of an attack generally include Reconnaissance, Breach, Escalate privilages, Stage, Exploit.
What defense methodology is Layering?
Layering involves implementing multiple security measures to protect the same asset.
What defense methodology is the principle of least privilege?
The principle of least privilege states that users or groups are given only the access they need to do their job and nothing more.
What does access control mean?
Access control is the ability to permit or deny privileges that users have when accessing resources on a network or computer.
What processes are included in access control?
Some processes that are included in access control are Identification, Authentication, Authorization, and Auditing.
What is the MAC access control model?
The MAC access control model is Mandatory Access Control which uses authorization policies to determine if a resource can be accessed by a specific user.
What is the DAC access control model?
The DAC access control model is Discretionary Access Control which assigns access directly to users based on the discretion of the owner of the resource.
What is the RBAC access control model?
The RBAC access control model is Role-Based Access Control where access is allowed based on the role of the user in an organization.
What does authorization mean?
Authorization is the process of controlling access to resources.
What is an Access Control List?
An Access Control List identifies users or groups who have specific security assignments to an object.
What is a DACL type of access list?
A DACL access list is a Discretionary Access Control List which is the implementation of Discretionary Access Control (DAC)
What is a SACL type of access list?
A SACL access list is a System Access Control List which is used by Microsoft for auditing to identify past actions performed by users on an object.
What are Effective Permissions?
Effective permissions are the combined inherited permissions and explicit permissions.
Define ‘Need to know’.
Need to know describes the restriction of data that is highly sensitive and is usually referenced in government and military context.
Define ‘Separation of duty”.
Separation of duty is the concept of having more than one person required to complete a task.
Define ‘Job rotation’.
Job rotation is a technique where users are cross-trained in multiple job positions, and where responsibilities are regularly rotated between personnel.
Define ‘Defense-in-depth’.
Defense-in-depth is an access control method which implements multiple access control methods instead of relying on a single method.
What is creeping privileges?
Creeping privileges occurs when a user’s job position is changed and they are granted a new set of access privileges and their previous access privileges are not removed or modified.
What are the four stages in the remote access process?
The four stages in the remote access process are Connection, Authentication, Authorization, and Accounting.
Explain RADIUS.
Remote Authentication Dial-In User Service is used to centralize remote access administration. A RADIUS server combined authentication, authorization, and accounting and can use PPP, CHAP, and PAP. RADIUS uses UDP port 1812 and 1813.
Explain TACACS+
Terminal Access Controller Access-Control System Plus is used to centralize remote access administration. TACACS+ provides authentication, authorization, and accounting with the ability to host each service on separate servers. TACACS+ uses TCP port 49.
What is Telephony?
Telephony is the transmission of voice communications.