LP - Security Goals and Controls Flashcards
Security Goals and Controls
CIA Triad stands for
Confidentiality, Integrity, Availability
PII stands for
Personally identifiable information
PHI stands for
Personal health information
High availability is a
failover feature to ensure availability during interruptions
AAA stands for
Authentication, Authorization, and Accounting (AAA)
Character mode in AAA is
keystrokes and commands sent for configuration or administration
Packet (or network) mode occures when the
network device serves as an authentication proxy on behalf of services in other networks eg web, FTP, DNS, etc
In authentication the three way handshake should be done
after the authentication process
Accounting is generally implement for two use cases they are
- Monitoring, visibility and reporting
- Billing, chargeback, and reporting
RADIUS is used for accounting and is based on what service
AAA
Endpoint (or device) Authentication is a security technique to ensure only
authorized devices can connect
NPE’s are what?
Non-person entities
Endpoint management is also used in
M2M (machine to machine)
Some endpoint authentication methods (5) are
- shared secret key
- X.509 v3 device certificate
- cryptographic key, certificate or other credential stored on the hardware
- Hardware security module (HSM)
- Protected access file (PAC) in a Cisco system
Authorization Model DAC stands for
Discretionary access control
DAC has fine grained control over access but it can result in
inconsistent access control decisions
Authorization Model DAC is prone to
privilege creep
Authorization Model RBAC stands for
Role-based access control
Authorization Model MAC stands for
Mandatory access control
Mandatory access control (MAC) is a strict maths model where access is determined by the system based on
predefined security labels and rules
Principals in the MAC model are assigned
Security clearences or classification levels
Resource objects in the MAC model are labeled with
Sensitivity levels
Access in the MAC model is granted or denied by
comparing the security clearences or classification levels with the sensitivity levels
The MAC model discretionary or non-discretionary
non-discretionary
Authorization Model ABAC stands for
Attribute-based access control
Authorization Model ABDAC stand for
attribute-based dynamic access control
UBA stands for
user behavioural analytics
Authorization Model Rule-based access contol has the same acrynom as
role-based access control