OBJ 4.1 X Flashcards
Confidentiality, integrity, availability (CIA)
CIA Triad
Common vulnerabilities and exposures (CVE)
A list of publicly disclosed computer security weaknesses
Zero-day
Brand new vulnerability
Exploits
Piece of software code that takes advantage of a security flaw or
vulnerability within a system or network
Least privilege
Using the lowest level of permissions or privileges needed in order to
complete a job function or admin task
Role-based access
Discretionary Access Control (DAC) -An access control method where access is determined by the
owner of the resource
Mandatory Access Control (MAC)
● An access control policy where the computer system gets to decide who gets access to what objects
Role-Based Access Control (RBAC)
▪ An access model that is controlled by the system but focuses on a set of
permissions versus an individual’s permissions
▪ Creating groups makes it easy to control permissions based around actual job functions
Zero Trust
A security framework that requires users to be authenticated and
authorized before being granted access to applications and data
Defense in depth
Cybersecurity approach in which a series of defensive mechanisms are layered in order to protect valuable data and information
▪ Physical
▪ Logic
▪ Administrative
Terminal Access Controller Access-
Control System Plus (TACACS+)
Used to perform the role of an authenticator in an 802.1x network
Remote Authentication Dial-in User Service (RADIUS)
Provides centralized administration of dial-up, VPN, and wireless network
authentication
LDAP
Validates a username and password combination against an LDAP server
as a form of authentication
● Port 389 LDAP
● Port 636 LDAP Secure
Kerberos
▪ Focused on authentication and authorization within a Windows domain environment
▪ Provides secure authentication over an insecure network
Local authentication
Process of determining whether someone or something is who or what it
● Claims itself to be
● Simplified version of X.500
Extensible Authentication Protocol (EAP)
Allows for numerous different mechanisms of authentication
Risk Management
The identification, evaluation, and prioritization of risks to minimize, monitor, and control the vulnerability exploited by a threat