Security+ Flashcards
sec +
what do the terms PII PHI and IP stand for in regards to confidentiality
Personally identifying information, Personal health information, Intellectual Property
what are the three components of the CIA triad
Confidentiality, Integrity, Availibility
what is non-repudiation
non repudiation is the enforcement of the inability for a subject to deny they took part in an agreement or contract
What is AAA
Authentication, Authorisation, Accounting
what is Character mode
character mode sends keystrokes or commands to a network admission device for the purpse of configuration or administration on that same device
what is Packet or network mode
packet/network mode occurs when the network admission device servs as an authentication proxy on behalf of the services in other networks such as web,ftp,dns etc
what are the 4 common device authentication methods
a shared secret key stored on endpoints.
an X.509 V3 device certificate stored in a software application.
a cryptographic key , cert or other credential stored at hardware level in a tpm.
a key stored in a Hardware security module HSM.
a Protected Access File PAC file in a EAP-FAST network.
what is DAC
dac is discretionary access control, DAC grants accces to the resource decisions to the owners and custodians
what is RBAC
RBAC is role based access control
in which access is granted based on job title, users gain rights based on their roles
what is MAC in terms of authorisation models
Mandatory access control is a strict mathematical model in which access to a resource is determined by the system based on predefined security labels and rules, principals are assigned security clearences such as top secret,classified etc
resource objects are labled with sensitivity levels
access is granted or denied by comparing these labels and rules, ensuring strict control and preventing unauthorized access
this is a non-discretionary model
what is ABAC
ABAC is attribute based access control, abac uses combination of characteristics associated with user such as job role, use of vpn, sensitvity level, time of access etc
authorisation policies are defined using these combinations and decisions made based on evaluating the attibutes against defined policies
what is ABDAC
ABDAC is the combination of DAC and ABAC Attribute based dynamic access control, considers factors such as risk assement, user attributes and resource attributes and contextual information to make access control decisions in real time
what are the 4 main security control categories
Technical, Physical, Managerial and Operational
what are the 6 main security control categories
Preventative, deterrent
Detective, corrective
compensating, directive
what is gap analysis
gap analysis is the process of analysing the current stat and where you would like the business to be in regards to it security it could be applied to projects, plans and initiatives throught an entire career
what are some common security gaps
weak/shared creds
lack of tested patch management
violation of tested patch management
no/unenforced AUP
poor physical security
config and deployment errors due to lack of
change and config management
lack of proper auditing
what is ZT
Zero Trust
a term for an evolving set of cybsec intiatives that move away from static network based perimeters
ZT assumes there is no implicit trust granted to assets based purely on network/physical location or asset ownership
What is SIEM
Security Information and Event Management
SIEM systems give security teams a more holistic look at who is trying to gain access to their systems at any point in time
what is SOAR
Security orchestration, automation, and response
refers to a set of tools and services which automate cyberattack prevention and response
what is the PDP
policy decision point
which is contained in the ZT control data plane
what is the PE
Policy Engine
uses enterprise policy driven access control to grant/deny or revoke access to resources
what is the PA
Policy Administrator
the PA enables/disables the communications path between a subject and a resource via commands to associated policy enforcement points
what is PEP
Policy enforcement point
a device such as switch which forwards info to the policy data plane to then be verified and then the information can leave as trusted