2.1 - Enterprise Security Flashcards
Define Configuration Management.
Configuration Management is the process of maintaining systems, such as computer hardware and software, in a desired state. This includes identifying and and documenting hardware and software settings.
Define a Network Diagram.
A diagram of the physical wire and devices within a network.
Define a Physical data center layout.
A diagram of the datacenter that gives the layout of the datacenter and can include physical rack locations.
Define a Device Diagram.
A diagram of the individual devices and individual cabling running to them.
Define Baseline Configuration.
A documented set of specifications for an information system, or a configuration item within a system, that has been formally reviewed and agreed on at a given point in time, and which can be changed only through change control procedures.
List some examples of things that should have a standard naming convention within a network.
1) Devices
2) Networks (ports)
3) Domain names and emails
List some ways that data can be protected.
1) Encryption
2) Security Policies
3) Data permissions
Define and explain Data Sovereignty.
Data that resides in a country is subject to the laws of that country (legal monitoring, court orders, etc.)
Laws may prohibit where data is stored. For example, data collected on EU citizens must be stored in the EU. GDPR (General Data Protection Regulation)
Define Data Masking.
Hiding some of the data (like hashing out most of a debit card on a receipt). It may only be hidden from view, but it may be still in storage.
Data masking can be done via substituting, shuffling, encrypting, masking out, etc.
Define Data Encryption.
Encoding information into unreadable data. The original information is plaintext, and the encrypted form is ciphertext.
Define Diffusion.
Changing one character of the input, and many characters change of the output.
If you change one character of plaintext, the whole ciphertext changes.
Define Data at-rest and how to protect it.
Data that is on a storage device.
The data can be encrypted or have permission assigned to it.
Define Data in-transit and how to protect it.
Data that is transmitted over the network.
Can protect it with transport encryption (TLS or IPSec) or Network-based protections (Firewall or IPS).
Define Data in-use.
Data that is actively processing in memory (system RAM, CPU registers and cache). This data is always decrypted.
Define Tokenization.
Replacing sensitive data with a non-sensitive placeholder. The token and the data aren’t mathematically related.
This is common with credit card processing. It uses a temporary token during payment that isn’t useful if captured.
Define Information Rights Management (IRM).
Controls how data is used. It restricts data access to unauthorized persons. Each user has their own set of rights.