4.1 Explain the importance of basic network security concepts. Flashcards

1
Q

Explain logical security in terms of “data in transit”.

A
  • Data transmitted over the network
  • Also called “data in motion”
  • Not much protection as it travels (switches, routers, devices)
  • The security comes from other equipment (firewall, IPS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain logical security in terms of “data at rest”.

A
  • The data on a storage device (hard drive, SSD, Flash drive, etc.)
  • Encrypting the information as your write it to the storage drive.
  • Apply permissions to the data that you have stored (also ACLs).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Digital Certificates

A
  • A public key certificate
  • Binds a public key with a digital signature and other details about the key holder.
  • Adds trust to the PKI
  • Certificate creation can be built into the OS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is PKI?

A
  • Public Key infrastructure
  • Policies, procedures, hardware, software, and people form digital certificates.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is “self-signed” mean?

A
  • Internal certificates don’t need to be signed by a public CA
  • Your company is the only one going to use it.
  • Build your own CA to issue your own certificates signed by your own CA.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is IAM?

A
  • Identity and Access Management
  • Identify lifecycle management; every entity (human or non-human) gets a digital identity.
  • AAA (Access Control, Authentication, Authorization)
  • Identity Governance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is MFA?

A
  • Multi-factor Authentication
  • Using different methods to prove who you are.
  • Something you know (password), something you have (mobile app), something you are (biometric), somewhere you are (GPS location.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SSO?

A
  • Single Sign-on
  • You will only need to provide your credentials one time with no additional authentication required.
  • Usually a time frame so that you do not stay logged in all the time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is RADIUS?

A
  • Remote Authentication Dial-in User Service
  • One of the more common AAA protocols
  • Centralize authentication for users (routers, switches, firewalls, server authentication, remote VPN access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What role does LDAP play in authentication?

A
  • Lightweight Directory Access Protocol
  • Protocol for reading and writing directories over an IP network
  • An organized set of records, like a phone directory
  • X.500 specification was written by the International Telecommunications Union (ITU).
  • It allows you to add more attributes for additional context about a particular device to build a hierarchy of devices within your network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SAML?

A
  • Security Assertion Mark-up Language
  • Open standard for authentication and authorization
  • You can authenticate through a third-party to gain access
  • Not originally designed for mobile apps (biggest roadblock)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is TACACS+?

A
  • Terminal Access Controller Access Control System Plus
  • Remote authentication protocol
  • More authentication requests and response codes
  • Very Cisco-centric model of remote authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is time-based authentication?

A
  • TOTP (Time-based One-time Password algorithm)
  • Use a secret key and the time of day
  • No incremental counter.
  • The secret key is configured ahead of time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does it mean to grant the least-privileged access to something?

A
  • Rights and permissions should be set to the bare minimum
  • You only get exactly what’s needed to complete your objective.
  • All user accounts must be limited.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is role-based access control?

A
  • You have a role in your organization (manager, director, team lead, project manager).
  • Rights and permissions will be different based on their role.
  • Administrators provide the access based on those roles.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a honeypot?

A
  • Attract the bad guys and trap them there.
  • Create a virtual world for an attacker to explore.
17
Q

What is the CIA triad?

A
  1. Confidentiality: Prevents disclosure of info to unauthorized individuals or systems.
  2. Integrity: messages can’t be modified without detection
  3. Availability: Systems and networks must be up[ and running.
18
Q

What is PCI DSS?

A
  • Payment Card Industry Data Security Standards
  • A standard for protecting credit cards
  • Six control objectives
    1. Build and maintain a secure network and systems
    2. Protect cardholder data
    3. Maintain vulnerability management program
    4. Implement strong access control measures
    5. Regularly monitor and test networks
    6. Maintain an information security policy
19
Q

What is GDPR?

A
  • General Data Protection Regulation
  • European Union regulation
  • Protected data for individuals such as name, address, photo, e-mail address, bank details, posts on social media, medical information, a computer’s IP address.
  • Laws that prohibit where data is stored and how it should be stored.
20
Q

What is IoT?

A
  • Internet of Things
  • Sensors (heating, cooling, lighting)
  • Smart Devices (home automation, video doorbells)
  • Wearable technology (watches, health monitors)
21
Q

What is IIoT?

A
  • Industrial Internet of Things
  • Machine to machine communication
  • Segmentation is just as important here sense more data is at stake.
22
Q

What is SCADA / ICS?

A
  • Supervisory Control and Data Acquisition / Industrial Control System
  • Large Scale
  • PC manages equipment (power generation, refining, manufacturing equipment)
  • Real-time information and system control
23
Q

What is OT?

A
  • Operational Technology
  • The hardware and software for industrial equipment
  • Examples: Electric grids, traffic control, manufacturing plants, etc.
24
Q

What is BYOD?

A
  • Bring Your Own Device