Security Concepts Flashcards
1.2
What is the CIA Triad?
Confidentiality
Integrity
Availability
What does confidentiality mean in the CIA triad?
Prevent disclosure of information to unauthorized individuals or systems
-Encryption
-Access Controls
-Two Factor Authentication
What does Integrity mean in the CIA triad?
Messages can’t be modified without detection
-Hashing (map data of arbitrary length to data of a fixed length)
-Digital Signatures
-Certificates
-Non repudiation (Proof of identity)
What does Availability mean in the CIA triad?
Systems and networks must be up and running
-Redundancy (Build services that will always be available)
-Fault tolerance (System will run even when failure occurs)
-Patching
What are the main functions of a hash?
Represents data as a short string of text (Like a fingerprint)
Verifies that data has not changed.
Does not verify that the person that sent the data is correct.
One character change in data can change the hash drastically
What is Identification, Authentication, Authorization, and Accounting (AAA Framework)?
Identification
- This is who you claim to be (Username)
Authentication
- Prove you are who you say you are (Password and other authentication factors)
Authorization
- Based on your identification and authentication, what access do you have.
Accounting
- Resources used: Login time, data sent and received, logout time.
How do device certificates work?
- An organization will have a CA (Certificate Authority)
- The organization creates a certificate for a device and signs it by the CA
- When a device logs onto an org’s systems, compare the two certificates; if the device certificate was signed by the CA, then allow access
What is Zero Trust
Everything must be verified
-Nothing is inherently trusted.
-Multi-factor authentication, encryption, additional firewalls, monitoring and analytics
What is the Data plane when it comes to zero trust
Process the frames, packets, and network data
-Switch, router, firewall
What is the Control plane when it comes to zero trust
Manages the actions of the data plane
-Define policies and rules
-determines how packets should be forwarded
-routing tables, session tables, NAT tables
PEP
Policy Enforcement Point
-Gatekeeper
-Everything must pass through the PEP
-The step between an untrusted system and a resource
-Allow, monitor, and terminate connections
PDP
Policy Decision Point
-The process for making an authentication decision
-Policy Engine (Evaluates access deciosions based on policy and other information sources)
-Policy Administrator (Generates access toklens or credentials, communicates with the PEP)
HoneyPots
Attracts attackers and keeps them involved in those systems
Virtual world to explore
Usually attracts bots
HoneyNet
Virtualized Network of HoneyPots
-Servers
-Workstations
-routers
-Firewalls
HoneyFile
A fake file that has fake information that would look importatnt to an attacker
-Password.txt
-Set alarms to these files
HoneyToken
Traceable Data in the Honeynet (If stolen you will know where it came from)
-API Credentials
-Fake Email Addresses
-Database records, browser cookies