4.1 – Common Security Concepts Flashcards
What is the CIA triad?
Confidentiality, integrity, and availability. Which are the elements of the information system that each organization is trying to protect
what is confidentiality
certain info should be known to certain people
what is integrity
data is being stored and transferred as intended
what is availability
data is available to authorized users
What is Vulnerability?
A weakness that could be accidentally triggered or intentionally exploited to cause a security breach.
What is a Threat?
The potential for someone or something to exploit a vulnerability and breach security.
RBAC
role based access control
Define 802.1X
The IEEE standard that defines port-based security for wireless network access control.
a trap to attract bad guys
usually virtual
used to research what hackers are attacking
Honey pot
common AAA protocol
many devices
remote vpn
available on most OS
remote authentication dial in user service
remote authentication protocol
created to control access to dialup lines
TACACS terminal access controller access control system
organized set or records
protocol for reading and writing directories over an ip
LDAP light weight directory access protocol
authenticate once and trusted
no need to re authenticate
mutual authentication
kerberos
port based network access control (NAC)
prevents access to network until authentication succeeds
IEEE 802.1x
EAP
Extensible Authentication Protocol