Chapter 1 Flashcards
CIA/AIC Triad
Confidentiality, Integrity, Availability
SOP
Standard Operating Procedure
AAA
Authentication, Authorization, and Accounting
Operational category of security controls
Security controls operated by PEOPLE
MFA
Multi-Factor Authentication
Data plane
transmits data in real time
Control plane
Manages actions of the data plane
Adaptive identity
Part of control plane- adapts and makes authentication process stronger if necessary
Policy-driven access control
Part of control plane- combines adaptive identity with established policies to further authenticate end user
Policy enforcement point
Part of data plane- end users must pass through the policy enforcement point, which can then allow, monitor, or terminate connections.
PEP
Policy Enforcement Point
PDP
Policy decision point
Policy decision point
Part of control plane- the policy engine and policy administrator come together to make an authentication decision
Policy engine
Part of control plane- looks at all requests coming through, and grants, denies, or revokes request.
Policy administrator
Part of control plane- Can generate access credentials or tokens. Communicates with Policy Enforcement Point (PEP) in data plane to allow or disallow access.
Access control vestibule
A physical security entry system with two gateways, only one of which is open at any one time.
Honeypot
A virtual world set up to entice attackers- forces attackers to discern whether they are actual systems or fake
Honeynet
A larger deception network with multiple honeypots
Honeyfile
Files with fake information or may appear to be important, such as passwords.txt
API
Application Programming Interface
Honeytoken
A piece of traceable data in a honeynet to track attackers. Could be fake API credentials, browser cookies, or a fake email address.
Allow list
Nothing runs unless it’s approved. Very restrictive
Deny list
Nothing on the “bad list” can be executed. Uses anti-virus, anti-malware. More liberal than an allow list
Dependencies
Having to update extra items just so you can execute a different update. Ex: I want to study, but I have to clean my room so I can focus first.
Legacy applications
Applications no longer supported by developer - here before you, will be here after you.
Version control
Keeps detailed documentation of each version of software, allows us to keep a copy to revert back to if necessary.
PKI
Public Key Infrastructure
Symmetric encryption
A single shared key to encrypt and decrypt. Fast to use but not as secure as asymmetric encryption.