Section 10 Flashcards
What does CIA stand for?
Confidentiality, Integrity, Availability
is a process that uses mathematical models to convert readable data( plaintext ) into an unreadable form ( ciphertext )
Encryption
is a security mechanism that prevents an individual or entity from denying their participation in a transaction or communication
Non-repudiation
What should be exchanged for 2 people to communicate ( hint keys )
Public Keys
uses a public and private key
Asymmetric
Creates a fixed-sized hash value
Hash
used to verify data integrity
Hash
2 Common hashes
MD5 and SHA-1
include something you know, have, or are
Authentication factors
include something you do, exhibit, know, or somewhere you are
Authentication attributes
is a security strategy that limits the ability of resource owners to grant or deny access to file system objects (Top secret) (uses labels)
(MAC) Mandatory access control
is a cybersecurity model that allows the owner of a resource to control who has access to it and what level of access they have. ( Owner )
( DAC ) Discretionary access control
restricts network access based on a person’s role within an organization and has become one of the main methods for advanced access control (Sales) (uses groups)
(RBAC) Role-based access control
Uses UDP ports 1812-1813 or UDP 1645-1646
Radius
Provides AAA— Authentication, Authorization, and Accounting
Radius