3.0 Flashcards
LDAP/ LDAPS
Lightweight Directory Access Protocol/LDAP Secure
A standard protocol designed to maintain and access “directory services” within a network
Port 389 and 636
UTM
Unified Threat Management
All-in-one security appliance. When multiple security features or services are combined into a single device within your network.
PKI
Public Key Infrastructure
Framework managing digital certificates, encryption keys, and authentication processes, facilitating secure communication and data protection.
802.1X
A standard used in network security that provides port-based authentication (authenticated by a certificate) to devices attempting to connect to a network (NAC). You don’t get access to the network until you authenticate.
PEAP
Protected Extensible Authentication Protocol
An EAP method that uses a secure TLS tunnel. Protects authentication process within an encrypted channel.
EAP-FAST
EAP Flexible Authentication via Secure Tunneling
An EAP method that enables secure communication between a client and an authentication server by using Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Using a secure tunnel without requiring server certificates.
CASB
Cloud access security broker
Placed between cloud service consumers and cloud service providers to monitor all activity and enforces security policies.
FDE
Full disk encryption
A security technology used to encrypt all data stored on a computer’s hard drive or storage device. Encrypt everything on the drive
SED
Self-encrypting drive
A type of storage device (such as a hard drive or solid-state drive) that includes built-in hardware-based encryption capabilities.
Containerization
A lightweight virtualization technology that allows applications and their dependencies to be packaged and isolated into containers.
MAC filtering
Media access control filtering
A network security technique used to control which devices can connect to a network based on their MAC addresses. Limit access through the physical hardware address.
MDM
Mobile Device Management
A type of software solution that helps organizations manage and secure mobile devices used by employees within their network. Manage company-owned and user-owned mobile devices
COPE
Corporate-Owned, Personally Enabled
A mobile device management strategy used by organizations to manage company-owned devices while allowing employees some level of personal use.
VDI/VMI
Virtual Desktop Infrastructure/Virtual Mobile Infrastructure
VDI is a technology that allows users to access a desktop environment virtually, rather than having a physical computer at their desk. VMI is similar to VDI but focuses on virtualizing mobile device environments, such as smartphones or tablets.
– The apps are separated from the mobile device
– The data is separated from the mobile device
WPA2
Wi-Fi Protected Access 2
It’s a security protocol used to protect wireless networks from unauthorized access and data interception.
Employs the Advanced Encryption Standard AES with a 128-bit key.
WPS
Wi-Fi Protected Setup
Wi-Fi Protected Setup (WPS) is a network security standard that was created to simplify the process of connecting devices to a secure wireless network.
RBAC
Role-based access control
A method of restricting network access based on the roles of individual users within an organization.
ABAC
Attribute-based access control
A more flexible access control model that uses attributes about users, systems, and the environment to make access control decisions. Ex. location, time, and device, as well as username and password.
DAC
Discretionary Access Control
A type of access control where the owner of a resource determines who can access that resource and what permissions they have. DAC, access decisions are based on the discretion of the resource owner, who can grant or revoke access rights to users or groups.
MAC
Mandatory Access Control
Access control scheme uses labels to grant access, controlling data access and preventing unauthorized use.
VLAN
Virtual local area network
A network segmentation technique used to divide a single physical network into multiple logical networks
Measured Boot
Ensures boot process integrity by measuring and comparing cryptographic hashes of key components.
Process hashes the subsequent processes and compares the hash values to known good values.
Trusted Boot
Establishes a chain of trust during startup, verifying firmware and OS integrity using hardware-based security features like TPM.
Process verifies the digital signature of the OS kernel
Secure Boot
Prevents unauthorized software execution during boot by verifying digital signatures of bootloader and OS components.
NGFW
Next-generation firewall
An advanced network security solution that combines traditional firewall capabilities with additional features such as intrusion prevention, application awareness, and advanced threat detection and mitigation.
IPSec
Internet Protocol Security
A suite of protocols used to secure and encrypt communication over IP networks. Send information in the layer 3 public internet, but encrypt the data
Uses Authentication Header (AH) for integrity and Encapsulation Security Payload (ESP) for encryption.
SSL
Secure Sockets Layer
It ensures that data exchanged between a web server and a web browser remains confidential, integral, and authenticated. However, it’s worth noting that SSL has been largely replaced by its successor, Transport Layer Security (TLS), which offers enhanced security features and improved protocols.
CA
Certificate Authority
Is the trusted authority that certifies individuals’ identities and creates electronic documents indicating that individuals are who they say they are.
TACACS+
Terminal Access Controller Access-Control System Plus
A network authentication, authorization, and accounting (AAA) capabilities, a remote authentication protocol, which allows a remote access server to communicate with an authentication server to validate user access onto the network.
Kerberos
A network authentication protocol designed to provide secure authentication for client-server applications over a non-secure network, such as the internet. (Ticketing system)
TPM
Trusted Platform Module
A chip that resides on the motherboard of the device. Provides the operating system with access to keys.
Ex. enables hard drive encryption
HSM
Hardware Security Module
A security device you can add to a system to manage, generate, and securely store cryptographic keys.
Proxies
Proxies are servers that act as middlemen between your device (like a computer or phone) and the internet. They help with things like hiding your IP address, filtering content, speeding up web browsing by storing copies of web pages, and balancing internet traffic across multiple servers.
SMTP
Simple Mail Transfer Protocol
The standard Internet protocol used to transfer e-mail between hosts.
Protocol number 25
S/MIME
Secure/Multipurpose Internet Mail Extensions
A protocol that adds a layer of security to email messages. It provides encryption and digital signatures to ensure the confidentiality, integrity, and authenticity of email communication.
DLP
Data Loss Prevention
Solutions serve to prevent sensitive data from leaving the network without notice.
Boot Attestation
Boot attestation verifies the integrity of a computer’s boot process using cryptographic signatures to ensure only trusted software components are loaded, preventing unauthorized alterations.
Tokenization
Is the process of substituting a surrogate value, called a token, for a sensitive data element.
Salting
Is the process of adding a random element to a value before performing a mathematical operation like hashing.
Hashing
A process of converting input data (such as text, files, or passwords) into a fixed-size string of characters using a hash function. Hashing is commonly used for data integrity verification, password storage, digital signatures, and indexing data structures.
Static code analysis
Is when the code is examined without being executed.
Dynamic code analysis
Analyzes the code during execution.
Fuzzing
(or fuzz testing) is a brute force method of addressing input validation issues and vulnerabilities. They have software tools that transmit unexpected and abnormal data to applications to assess their response.
Registry
Repository of all information related to configurations. Configuration options for the OS are located in the Registry.
Zero Trust
Zero trust network is a network that doesn’t trust any devices by default, even if it was previously verified.
NGSWG
Next-Gen Secure Web Gateway
A combination of a proxy server and a stateless firewall. Provides proxy services for traffic from clients to Internet sites, such as filtering URLs and scanning for malware.
MAM
Mobile Application Management
Manages applications on mobile devices. Provision, update, and remove apps.
Jump server
A hardened server used to access and manage devices in another network with a different security zone.
UEM
Unified Endpoint Management
to ensure systems are kept up to date with current patches, have antivirus software installed with up-to-date definitions, and are secured using standard security practices.
MDM
Mobile device management
Includes the technologies to manage mobile devices with the goal to ensure these devices have security controls in place to keep them secure.
Ex. Application management, Full device encryption, Passwords and PINs
SAML
Security Assertion Markup Language
It is an XML-based, open-standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider.
Key Escrow
A method of storing decryption keys with a
trusted third-party. This includes a system by which your private key is kept both by you and by a third party.
DNSSEC
Domain Name System Security Extensions
Allows for the verification of DNS data and denial of existence and ensures data integrity for DNS. However, it does not offer confidentiality or availability controls.
NAT Gateway
Network Address Translation Gateway
allows private subnets to communicate with other cloud services and the Internet, but hides the internal network from Internet users.
RADIUS
Remote Authentication Dial-In User Service
Used to provide AAA for network services,
a networking protocol that authorizes and authenticates users who access a remote network.
PAP
Password Authentication Protocol
is a simple, plain-text password-based authentication protocol used by Point-to-Point Protocol (PPP) to validate users.
Resource policies
Identity and access management (IAM)
– Who gets access, what they get access to on the cloud
This allows your organization to set restrictions, manage the resources, and manage cloud costs
WPA3
Wi-Fi Protected Access 3
Released in 2018 to address the weaknesses in WPA2.
Uses a much stronger 256-bit Galois/Counter Mode Protocol (GCMP-256) for encryption.
There are two versions: WPA3-Personal for home users, and WPA3-Enterprise for corporate users
CHAP
Challenge-Handshake Authentication Protocol
A more secure version of PAP. Sends an encrypted challenge sent over the network and client has to send a match to be authenticated.
OCSP
Online Certificate Status Protocol
A protocol used for obtaining the revocation status of a digital certificate in real-time. It allows applications to check if a certificate has been revoked by querying a certificate authority’s (CA) OCSP server.
CRL
Certificate Revocation List
A list of certificates that have been revoked by the certificate authority before their scheduled expiration date. This list is periodically published by the CA.
CSR
Certificate Signing Request
A block of encoded text that is given to a certificate authority when applying for a digital certificate. It contains information about the entity requesting the certificate and the public key to be included in the certificate.
Secure Cookies
Cookies are text files sent with every request to a website. Secure attribute, when set, instructs the browser and server to only transport the cookie over HTTPS channels.
Implicit deny
It indicates that all traffic that isn’t explicitly allowed is implicitly denied. The implicit deny rule is the last rule in an ACL.