Policies To Protect Data (Chapter 7) Flashcards
Software tokens
A style of 2FA in which an external devices is promoted with a unique authentication code that allows the program to verify the correct user.
- prevents relay attacks
Relay Attack
An attacker intercepts some authentication data and refuses it to try to re-establish a session
Remote Authentication Dail-in User Service (RADIUS)
Form of AAA used to manage remote and wireless authentication infrastructure, used for users to remotely log in to network
Terminal Access Controller Access Control System (TACACS+)
An alternative to RADIUS used for network administrator to remotely work with network devices
Policies hierarchy
Enforced Policy
OU policy
Domain Policy
Site policy
Local policy
ICM
Information Content Management
- the process of managing information over it’s lifecycle, from creation to deletion
Data is classified under sensitivity levels (unclassified, classified, confidential, secret and top secret) which will dictate how the data is handled
PII
Personal Identifiable Information
Data that can be used to identify or contact an individual
PHI
Protected Health information
- information that identifies someone as the subject to medical and insurance records
PCI DSS
Protected Card Information Data Security Standard
- standard for organisations that process bank card payments
ACL
Access Control List
- The permission attached to or configured on a network resource
ACE
Access Control Entries
- within an ALC, the records of subjects and permissions they hold on the resources
Encrypting File System
files and folders can be encrypted to ensure privacy of the data
- dive must be formatted with NTFS
- windows business
FDE
Full Disk Encryption
- encryption of all data on a disk and stores the encryption key on the motherboard TPM chip
- needs to be enabled in UEFI and BitLocker used to set up full disk encryption
DLP
Data Loss Prevention
Software that can identify data that has been classified and apply fine-grained user privileges to it
Incident Response lifecycle
1) Preparation
2) Detection & Analysis
3) Containment Eradication & Recovery
4) Post-incident activities