2.1 Enterprise Security Concepts Flashcards
What is the importance of configuration management and documentation?
Mainly to allow easy manual re-configuration of devices should there be a failure or catastrophe
What is the importance of network diagrams?
To know where devices are on the network and how they are physically connected to each other
What is the importance of baseline configurations? (2)
- ensure new equipment is configured correctly
- check to ensure that existing equipment is properly configured
What is the importance of standard naming conventions?
Standard naming conventions allow for easy identification of equipment, such as if the device is a router, switch, user workstation, etc..
What is the importance of an IP Schema? (2)
- Identifying physical location of an IP address
- Identifying type of equipment by IP address
Define data sovereignty
Laws and regulations for data based on the location of the data, i.e. data collected on EU citizens must physically reside in the EU
What is masking (relative to data)?
A technique to protect sensitive data, such as only display the last 4 numbers of a credit card and replacing the rest of the numbers with asterisks
What is data at rest and how can it be protected?
Data at rest is data that is stored on a storage device, such as SSD. Encryption and file/folder permissions can be used to protect this data.
Define data in transit/motion and how to protect it
- Data that is being transmitted across a network
- Encryption and network devices, such as a firewall
Define data in-processing and how it is vulnerable
Data in-processing is data that is in the memory or other system caches. It is not encrypted and vulnerable if access is gained to those hardware resources
What is tokenization?
Replacing data with data different from the original data. For example, instead of transmitting credit card numbers, a token is transferred across the network that can be used to identify the credit number
What is information rights management?
Protecting a document by only allowing certain actions based on the user. For example, denying copy/paste from a document.
What is DLP?
Data-Loss Prevention, intelligent systems that inspect and identify sensitive information and prevent it from exfiltrating the organization
Define response and recovery
Pre-determined and documented procedures need to be defined to follow in case of an attack or catastrophe to stop the threat and recover from the event
Define SSL/TLS Inspection
A host or device that acts as a man-in-middle to decrypt and re-encrypt network traffic to allow monitoring/inspection of network traffic