Section 10 Flashcards
(28 cards)
What does CIA stand for?
Confidentiality, Integrity, Availability
is a process that uses mathematical models to convert readable data( plaintext ) into an unreadable form ( ciphertext )
Encryption
is a security mechanism that prevents an individual or entity from denying their participation in a transaction or communication
Non-repudiation
What should be exchanged for 2 people to communicate ( hint keys )
Public Keys
uses a public and private key
Asymmetric
Creates a fixed-sized hash value
Hash
used to verify data integrity
Hash
2 Common hashes
MD5 and SHA-1
include something you know, have, or are
Authentication factors
include something you do, exhibit, know, or somewhere you are
Authentication attributes
is a security strategy that limits the ability of resource owners to grant or deny access to file system objects (Top secret) (uses labels)
(MAC) Mandatory access control
is a cybersecurity model that allows the owner of a resource to control who has access to it and what level of access they have. ( Owner )
( DAC ) Discretionary access control
restricts network access based on a person’s role within an organization and has become one of the main methods for advanced access control (Sales) (uses groups)
(RBAC) Role-based access control
Uses UDP ports 1812-1813 or UDP 1645-1646
Radius
Provides AAA— Authentication, Authorization, and Accounting
Radius
Uses TCP port 49
TACACS+
Designed to do authentications and authorization for local area networks
Kerberos
What is EAP
Extension Authentication Protocol- allows transactional based authentication mechanisms to be able to talk to each other
What is EAP PSK
EAP(pre-shared key) has a common key that everybody uses to log in
What is PEAP
Protected Extensible Authentication Protocol- uses a standard username and password
EAP MD5 uses…
Hash
EAP-TLS is…
a single certificate which comes from the server side; then pass to individual clients
EAP-TTLS is…
Requires both the individual clients and authenticating system to each have certificates
Relies heavily on time stamps
Kerberos