Remember Flashcards
WPA
Wi-Fi Protected Access (WPA) was an interim replacement for Wired Equivalent Privacy
(WEP). WEP has known vulnerabilities and should not be used. WPA provided an immediate solution to the weaknesses of WEP without requiring users to upgrade their hardware. Even when WPA replaced WEP, its developers recognized that WPA wasn’t solid enough to last for an extended period. Instead, WPA improved wireless security by giving users an alternative to WEP with existing hardware while the developers worked on creating the stronger WPA2 protocol.
WPA is susceptible to password-cracking attacks, especially when the AP has a weak
passphrase. The attacker uses a wireless protocol analyzer to capture the authentication traffic and then uses an offline brute force attack to discover the passphrase. Attackers often use a disassociation attack (discussed later in this chapter) to force the user to reauthenticate.
WPA2
Wi-Fi Protected Access II (WPA2) is the permanent replacement for WPA. WPA2 (also known as IEEE 802.11i) uses stronger cryptography than WPA. The Wi-Fi Alliance requires all devices
carrying its WI-FI CERTIFIED logo to meet WPA2 standards, including the use of the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). Although WPA2 provides significant security improvements over previous wireless
encryption techniques, some enterprises need stronger security.
WPA and WEP
WPA provided an immediate replacement for WEP and originally used TKIP, which
was compatible with older hardware. Later implementations support the stronger AES
encryption algorithm. WPA2 is the permanent replacement for WEP and WPA. WPA2 supports CCMP (based on AES), which is much stronger than the older TKIP protocol and
CCMP should be used instead of TKIP.
MAC’s
- Media access control. A 48-bit address used to identify network interface cards. It is also called
a hardware address or a physical address. - Mandatory access control. An access control model that uses sensitivity labels assigned to
objects (files and folders) and subjects (users). MAC restricts access based on a need to know. - Message authentication code (MAC) provides integrity similar to how a hash is
used.
Hypervisors I and II
Type I hypervisors run directly on bare-metal systems without an operating system.
Type ll hypervisors are software that run within an operating system. Container virtualization
runs within isolated cells or containers and does not have its own kernel.
Kerberos
Kerberos is a network authentication protocol within a Microsoft Windows Active
Directory domain or a Unix realm. It uses a database of objects such as Active Directory and a KDC (or TGT server) to issue timestamped tickets that expire after a certain time period. Additionally, Kerberos uses symmetric-key cryptography to prevent unauthorized disclosure and to ensure confidentiality.
LDAP
LDAP is based on an earlier version of X.500. Windows Active Directory domains and Unix realms use LDAP to identify objects in query strings with codes such as CN=Users and DC-GetCertifiedGetAhead. LDAPS encrypts transmissions with TLS.
SSO
Single sign-on enhances security by requiring users to use and remember only one set of credentials for authentication. Once signed on using SSO, this one set of credentials is used throughout a user’s entire session. SSO can provide central authentication against authentication. a federated database for different operating systems. SSO systems depend on strong Same sign-on is not the same as SSO. In a same sign-on system, users reenter their credentials each time they access another system. However, they use the same credentials.
Type I
Type II
Type III
Something you know
Something you have
Something you are
ESP
ESP stands for encapsulationg security payload, which provides integrity and encryption
AH or authentication headers only provide integrity, IKE or Internet Key exchange is used
during the setup of IPSec, and ISAKMP or Internet Security Association and Key
Management Protocol provides a framework for authentication and key exchange.
Deterrent
Corrective
Compensating
Administrative
A deterrent control is designed to discourage the violation of a security policy. Since the
cameras are clearly visible, they are acting as a deterrent control. A corrective control is
one that is used to fix or eliminate a vulnerability. A compensating control is used to
minimize a vulnerability when it is deemed too difficult or impractical to fully correct the
vulnerability. An administrative control is used to create a policy or procedures to
minimize or elminate a vulnerability.
OAuth
An open source standard used for authorization with Internet-based single sign-on
solutions.
OCSP
Online Certificate Status Protocol. An alternative to using a CRL. It allows entities to query a
CA with the serial number of a certificate. The CA answers with good, revoked, or unknown.
OpenID Connect
An open source standard used for identification on the Internet. It is typically used with OAuth and it allows clients to verify the identity of end users without managing their credentials.
out-of-band
A configuration that allows a device to collect traffic without the traffic passing through it. Sometimes called passive. Compare with inline.
P12
PKCS#12. A common format for PKI certificates. They are CER-based (binary) and often hold
certificates with the private key. They are commonly encrypted.
P7B
PKCS#7. A common format for PKI certificates. They are DER-based (ASCII) and commonly used
to share public keys.
Paas
Platform as a Service. A cloud computing model that provides cloud customers with a
preconfigured computing platform they can use as needed. Compare with laas and Saas.
PAP
Password Authentication Protocol. An older authentication protocol where passwords or PINS
are sent across the network in cleartext. Compare with CHAP and MS-CHAPV2.
passive reconnaissance
A penetration testing method used to collect information. It typically uses open-source intelligence. Compare with active reconnaissance.
PBKDF2
Password-Based Key Derivation Function 2. A key stretching technique that adds additional bits to a password as a salt. It helps prevent brute force and rainbow table attacks.
PEAP
Protected Extensible Authentication Protocol. An extension of EAP sometimes used with 802.1x. PEAP requires a certificate on the 802.1x server.
PEM
Privacy Enhanced Mail. A common format for PKI certificates. It can use either CER (ASCII) or DER (binary) formats and can be used for almost any type of certificates.
perfect forward secrecy
A characteristic of encryption keys ensuring that keys are random. Perfect forward secrecy methods do not use deterministic algorithms.
permission auditing review
An audit that analyzes user privileges. It identifies the privileges (rights and permissions) granted to users, and compares them against what the users need.
PFX
Personal Information Exchange. A common format for PKI certificates. It is the predecessor to P12 certificates.
NIST
National Institute of Standards and Technology. NIST is a part of the U.S. Department of Commerce, and it includes an Information Technology Laboratory (ITL). The ITL publishes special publications related to security that are freely available to anyone.