Security Technologies Flashcards
User can view the contents of a folder and any subfolders. User can view the contents of the file.
Read Permission
Read permission, plus the user can add files and create new subfolders. Read permission, plus the user can make changes (write) to the file.
Write Permission
Read permission, plus the user can run executable files contained in the folder. This permission is inherited by any subfolders and files. Read permission, plus the user can run a file if it is executable.
Read & Execute Permission
Read permission, plus the user can run executable files contained in the folder. This permission is inherited by subfolders only.
List Folder Contents Permission
Read and Write permissions, plus the user can delete the folder. Read and Write permissions, plus the user can delete the file.
Modify Permission
Read, Write, and Modify permissions and the user can delete all files and subfolders. Read, write, modify, and delete the file.
Full Control Permission
A user’s permissions are the sum of the permissions they have been assigned individually and obtained through any groups in which they are a member.
effective permissions
Syntax to modify file or folder attributes
attrib.exe
ATTRIB [ + attribute | - attribute ] [pathname] [/S [/D]]
What are the permission types on Linux?
Read (r): User can view the contents of a file.
Write (w): User can write to (modify) the contents of a file or directory.
Execute (x): User can run an executable file and view the contents of a directory.
In Linux, the person who is responsible for the file.
Owner
In Linux, includes members of the file’s group.
Group
In Linux, includes all users who are not in the file or folder’s group or the owner.
Others
Syntax for allowing all permissions in Linux
drwxrwxrwx.
Component included with many Linux distributions allows more options for setting file and folder permissions
Security Enhanced Linux (SELinux)
Default Share permission assigned to the Everyone group
Read
Default Share permission assigned to the Administrators group on the local computer
Full Control
Character at the end of the share name indicates that is a hidden share.
$
Permissions assigned to a parent object that flow down and apply to a child object.
Inherited permissions
This command allows you to copy objects while preserving their existing permissions.
xcopy
Option that allows the change of permissions to be applied to all sub folders
Propagating Permissions
A MMC snap-in (also available in Computer Management) which allows you to centrally manage users and groups on the computer. You can use it to create, rename, or delete users and groups; add users to groups; and set other user settings such as password policies, logon scripts, and folder locations.
Local Users and Groups
A utility which allows you to configure a wide range of security settings for the local computer, including those related to account management, default user rights, network functions, and so on. It works primarily by changing registry settings, but provides a much safer and more focused interface than REGEDIT
Local Security Policy
A utility which allows you to edit group policies for the entire computer
Local Group Policy Editor
A database which stores user passwords and performs authentication of local users
Security Account Manager
A Control Panel utility which allows individual users to access their stored user names, passwords, and certificates
Credential Manager
Notifies you when an action will change Windows settings and gives you an option to stop
User Account Control
A feature that runs in the background to protect critical system files, folders, and registry keys from unplanned alterations
Windows Resource Protection
Three network protocols associated w/ Active Directory?
LDAP - resource directory services
Kerberos - SSO authentication through the domain
DNS - mapping the server namespace
Stores information about all computers, users, and other resources that are available on the domain
domain controller
Uses the remote share to store all personal folders, desktop contents and appearance, Windows personalization, and application settings.
roaming profile account
Maps the remote share as a network drive and sets it as the user’s Documents folder.
home folder
Flexible approach which allows an administrator to decide which folders are stored only on the network and which are copied locally.
Folder redirection
A single sign-on system that uses the common Internet standard SAML instead of LDAP.
ADFS Active Directory Federation Services
Provides directory services independent of the Windows domain model.
AD LDS Active Directory Lightweight Directory Services
Allows the Active Directory network to maintain a public key infrastructure
AD CS Active Directory Certificate Services
An information rights management service that can encrypt and limit access to specific types of information on the domain, such as emails, Word documents, web pages, and so on
AD RMS Active Directory Rights Management Services
Allows a user or the operating system to read a file, but not write to it
Read-Only (R)
Specifies the file should be backed up
Archive (A)
Indicates the file is a system file and shouldn’t be altered or deleted
System (S)
Suppresses the display of the file in directory lists
Hidden (H)
Indicates a folder or sub-folder, differentiating them from files
Directory (D)
Windows has a search function that indexes all files and directories on a drive to achieve faster search results
Not content-indexed (I)
Notifies when an action changes Windows settings and gives an option to allow or deny
User Account Control
A Control Panel utility which allows individual users to access their stored usernames, passwords, and certificates
Credential Manager
A database containing low-level settings for all aspects of the Windows operating system as well as for some installed applications
Windows registry
A utility which allows a user to configure a wide range of security settings for the local computer
Local Security Policy
A database which stores user passwords and performs authentication of local users
Security Account Manager
What is the purpose of BitLocker in Windows?
drive encryption
The VPN protocols are managed either by software running on a host or router, or on a specialized hardware appliance known as ________.
VPN concentrator
Which security appliance intercepts and mediates communications between internal and external hosts on a network?
Proxy server
Which of the following is used to restrict devices which connect to the network or to detect and block some attacks using spoofed MAC addresses?
Port security
What command allows you to copy objects while preserving their existing permissions?
xcopy
Which Windows security feature runs in the background to protect critical system files, folders, and registry keys from unplanned alterations?
Windows Resource Protection
A switch feature that tracks device MAC addresses connected to each port on a switch, and allows or blocks traffic based on source MAC addresses
Port security
On Ethernet networks this is another term for port security, but it’s more commonly used for a similar feature on WAPs.
MAC filtering
Used to classify and protect your organization’s confidential and critical data
Data loss prevention (DLP) software
A networking device, such as a router, server, firewall, or similar device with Internetworking and data transmission capabilities that sits at the external edge of a secure internal network and requires an external device to identify and authenticate itself before the gateway creates a connection allowing access to internal network resources.
A VPN Gateway
Communications protocols that provide secure data transmission over an unsecure network. Data is commonly secured using an encryption protocol such as IPsec or a tunneling protocol such as SSL/TLS.
Secure transport protocols
Initially designed to provide full AAA support for users joining the network over dialup connections. Since then it’s been expanded to use for other point-to-point connections, such as authenticating remote users in a VPN, or by ISPs to authenticate customer connections
Remote Authentication Dial-In User Service (RADIUS)
A RADIUS system consists of three basic parts:
Users, RADIUS Server, NAS
RADIUS network protocols for authentication
PAP, CHAP, and EAP
A proprietary Cisco protocol with some performance and security benefits over RADIUS. Drawbacks include more complex configuration, and incompatibility with some network configurations.
TACACS+
An open standard with similar improvements to TACACS+, named for being supposedly twice as good as RADIUS
Diameter
Security Appliances
WAF Network antimalware Spam filter Content filter Proxy server
Relays all communication between users and the RADIUS server. It’s the device users directly connect to, like a dial-in server, VPN endpoint, or WAP.
Network Access Server (NAS)
Used to authenticate PPP sessions and can be used with many VPNs.
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
An authentication framework frequently used in wireless networks and point-to-point connections.
Extensible Authentication Protocol (EAP)
Enables a server to provide standardized and centralized authentication for remote users. It is a mechanism that allows authentication of dial-in and other network connections.
Remote Authentication Dial-In User Service (RADIUS)
A security protocol that combines digital certificates for authentication with public key data encryption.
Secure Sockets Layer (SSL)
A communication protocol that enables sending email from a client to a server or between servers.
Simple Mail Transfer Protocol (SMTP)
A voice over data implementation in which voice signals are transmitted over IP networks.
Voice over IP (VoIP)