Domain 1: General Security Concepts Flashcards
OSI Networking Model
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Network addressing
MAC Address
IP Address - lPv4 and IPv6
MAC Address
Permanent, “burned-in” network address used by network interfaces to communicate with local network
Ex.
0a : 1b : 2c : 3d : 4e : 5f
or
00 : 0d : 4f : 12 : 34 : 56
IP address - two types
IPv4- 32-bit address, separated into four “octets
• Valid IPs consist of 0-255 in each octet
Ex: 192.168.1.128, 127.0.0.1, 8.8.8.8
IPv6 - 128-bit address, represented on hexadecimal
• Values range from 0-9, A-F
Ex: fe80:0000:0000:afel:6bde:af0e:0509 or
2001:0db8:0000:0000:aaaa:abcd:7040:0073
Network Hardware
• Hub
• Switch
• Router
• Layer 3 Switch
Hub
Network aggregation device that re-transmits incoming data on all ports
- No longer used, causes large amount of interference, unable to support faster, data race like 1Gbps
- Layer 1 device
Switch
- network aggregation device that inspects each incoming frame to determine the destination Mac address, send data to the appropriate port where that Mac address is located
- Layer 2 device
Router
- network device that analyzes each incoming packet’s IP address to send data to appropriate interface or network to ensure delivery
- Layer 3 device
Layer 3 Switch
- like a normal layer 2 switch but analyzes IP address. Required for VLAN operation
- Layer 3 device
Fundamental Security Concepts
Objective 1.2
The CIA Triad
The CIA Triad
The CIA Triad is made up of
Confidentiality,
Integrity
and Availability
Confidentiality
Keeping secret things secret
Integrity
The data has not been altered in any way
Availability
The data or service is there when you need it
AAA
Identification
Authentication
Authorization
Accounting
Identification
- making the claim of who you are 
Authentication
- Proving you are who you claimed to be
Authorization
- Gaining access to your data and or services
Accounting
- keeping track of who has authenticated
(Or attempted to authenticate)
Non-Repudiation
- provided with a specific encryption key and or digital signature is used identify the sender of a message
- recipients are assured the source of the message, thanks to non-repudiation
- cannot deny having sent a message, as it was signed by them or was encrypted using their private key 
Gap Analysis
• analysis, a variation between organization, security, and requirements
• organization may be required by law, by industry, or by framework to have certain security measures in place
• cap analysis allows organization to examine any deviation to plan for corrective action, 
Zero Trust (ZTA)
• or Zero-Trust Architecture (ZTA) - requires authorization for each data transaction across network
• Control Plane
- Point of security control
- determines flow of data
• Data Plane
- point of interaction with data, most data around
- authorize to move data by the control plane in a zero-trust architecture
Kerberos
Kerberos is thought to be one of the more secure network authentication protocols and can be found in use by Windows Active Directory system. The Kerberos system evolves around the use of a Key Distribution Center (KDC) which ultimately issues tickets that allow a client to obtain access to a system resource by authenticating with the ticket.
Deception and Disruption
Honeypot
Honeynet
Enticing targets for would-be attackers to attempt to access:
- Honeyfile
- Honeytoken
Honeypot
- Attractive target to lure would-be attackers away from actual target
Honeynet
- Fake network or fake data center composed of honeypots to distract would-be attackers
Security Controls
Objective 1.1
- Categories
- Types
Categories
• Technical
• operational
• Managerial
• Physical
Technical
- forms of protection, implemented by an information system (Software or Hardware)
- example
- access control list, firewalls, intrusion detection systems, antivirus