N10-009-Section_4 Flashcards
Data in Transit/Motion
Data in Transit refers to the process of securing data as it is transmitted between systems, devices, or networks. Usually referred to in the context of security and how to encrypt said data while it’s in motion
Data at Rest
Data at Rest refers to the process of securing stored data by encrypting it to protect it from unauthorized access, theft, or breaches when it is not actively being transmitted or used. This includes data stored on devices such as servers, hard drives, SSDs, USB drives, or cloud storage.
PKI
PKI (Public Key Infrastructure) is a framework (policies, procedures, hardware, software, people) used to manage digital certificates and public-key encryption, enabling secure communication and authentication over networks. Uses key pair
CA
Certificate Authority - A third party that is trusted to sign digital certificates - this is a public entity that is not within your org
IAM
IAM (Identity and Access Management) is a framework of policies, processes, and technologies used to manage digital identities and control access to resources within an organization. It ensures the right individuals have access to the right resources at the right times, while keeping unauthorized access at bay.
Least Privilege
Users only have the minimum access they need to perform job
RBAC
Role-based Access Control. Users are in groups that give them permissions to resources
Geofencing
Geofencing, refers to the use of virtual boundaries, defined by GPS or RFID technology, to control or monitor network access, device usage, or services based on a specific geographic location.
AAA
Authentication, Authorization, Accounting
Identification
Part of Authentication. Keeping track of who is who. Who you are, your username/email - this is public information
Authentication
Goes hand in hand with Identification. The act of proving you are who you say you are. password, or other MFA
Authorization
Based on who you, what access do you have?
Accounting
Resources used, login time, data sent and received, logout time
RADIUS
Remote Authentication Dial-in User Service. An AAA protocol supported on many platforms to centralize authentication for users. Can be used for server authentication, routers, switches, firewalls, Remote VPN access, 802.11X network access.
LDAP
Lightweight Directory Access Protocol. Protocol for reading and writing directories over an IP network. Uses the X.500 standard (a directory standard)
X.500
A standard for organizing directories. Uses attribute=value pairs. CN=Common Name, OU=Organizational Unit and so on.
Container Objects
In an X.500 directory, Container Objects store and organize Leaf Objects. An OU.
Leaf Objects
In an X.500 directory, Leaf Objects represent the users, computers, printers and files themselves
SAML
Security Assertion Markup Language. An open standard for authentication and authorization. Manifests as a service itself that provides authentication to other services. The SAML service will authenticate the user, then pass a SAML assertion to the service provider of the service the user is trying to access. SAML is used a lot when using SSO for web-apps. SAML was not built for mobile devices and is weak in this area.
TACACS
Terminal Access Controller Access Control System. A remote authentication protocol originally created to control access to dial-up lines to ARPANET
TACACS+
Terminal Access Controller Access Control System Plus. The latest version of TACACS. Usually associated with Cisco products.
TOTP
Time-based One-time Password - random code that changes every few seconds for authentication. Generated from a secret key and the time of day (or something like that). Not really random, both the server and the client have synchronized clocks and the secret key so they will generate the same code at the same time.
Honeypot
A host designed to be enticing for hackers to try and hack. Hackers can reveal vulnerabilities so the network admins can put preventative measures in place
Honeynet
A network of honeypots. This will look more “real” to an attacker. Contains servers, workstations, routers, switches etc�
Risk
An exposure to harm or danger