Section 4.1 Flashcards
What does CIA stand for?
Confidentiality, Integrity, and Availability
Define Confidentiality
Information is kept safe from unauthorized individuals
Define Integrity
Information is true and unaltered
Define Availability
Information is accessible at all times
How do you maintain Confidentiality?
encryption
access controls
authentication
network security
physical security
steganography
training
How do you maintain Integrity?
hashing
digital signatures
certificates
How do you maintain Availability?
Redundancies, Load Balancing, Patching
Define Zero Trust
no user is trusted by default
What is a Threat?
A person or thing that could take advantage of a vulnerability
What is a Vulnerability?
A weakness in a system or a network that can be exploited by a threat.
What is an Exploit?
When a threat takes advantage of a vulnerability
RBAC
Role Based Access Control
What is Defense in Depth?
The utilization of multiple methods and layers of defense to minimize attack surface
What is Separation of Duties?
No one person has all of the access or knowledge
What are 3 way to protect a network interface?
port security (MAC address filtering)
802.1X (NAC) which requires authentication
manual deactivation of port by administrator
What does NAC stand for and what does it do?
Network Access Control
Requires authentication when plugging into a switch
Where does authentication take place?
locally or separate authentication server.
What are the common remote authentication protocols?
RADIUS, TACACS+, LDAP, Kerberos
What is the advantage of using Kerberos vs the other authentication protocols?
allows Single Sign On (SSO)
CVE
Common Vulnerabilities and Exposures
What are CVEs?
documented and cataloged vulnerabilities in software and hardware
CIA
Confidentiality, Integrity, Availability
What is Least Privilege?
users have minimum access necessary to perform their job
What’s the IEEE standard for NAC?
802.1X
What’s another name for DMZ?
Perimeter Network
What is the Perimeter Network?
the network between the internet and the internal network
TACACS+
Terminal Access Controller Access-Control System Plus
Between RADIUS and TACACS+, which provides granular control over what users can do?
TACACS+
EAP
Extensible Authentication Protocol
What’s TACACS+ commonly used for?
network device management
What is RADIUS commonly used for?
network access
What is LDAP commonly used for?
authentication and directory management
What is Kerberos?
ticket based authentication
SSO
Single Sign On
What does EAP do?
connects the client to the authentication server/protocol
What’s the goal of a Business Risk Assessment?
to identify potential risks and to implement strategies to mitigate them
What’s the goal of a Vendor Assessment?
to evaluate the security and reliability of a 3rd party
What’s the goal of a Process Assessment?
to ensure that internal processes are secure and efficient