Test Study Flashcards
CASB
Cloud Access Security Broker
applies security policies to the cloud
views application usage
enforces security policy
verification of compliance
802.1x
uses a centralized authentication server, and all users can use their normal credentials to authenticate to an 802.1X network
ABAC
Attribute Based Access Control
sets and enforces policies based on characteristics, such as department, location, manager, and time of day
DAC
Discretionary Access Control
the principle of restricting access to objects based on the identity of the subject (the user or the group to which the user belongs)
MAC
Mandatory Access Control
controls access to sensitive information in an organization
MAC grants access based on a user’s need to know. Users must prove they need the information before gaining access. The sensitivity of the resource is defined by a security label.
RBAC
Role Based Access Control
assigns rights and permissions based
on the role of a user. These roles are usually assigned by group
IPS
Intrustion Prevention System
a network security tool that monitors network traffic for potential threats
HSM
Hardware Security Module
Appliance used on the network to store certs and keys for all devices
TPM
Trusted Platform Module
A chip on individual computers that stores keys
ALE
Annual Loss Expectancy
SLE
Single Loss Expectancy
key escrow
storing decryption keys with a third party
hashing
one-way cryptographic algorithm that allows for the secure
storage of passwords
OSINT
open source intelligence
process of obtaining
information from open sources, such as social media sites, corporate
websites, online forums, and other publicly available locations.
footprinting
the process of using tools and techniques, like using the traceroute commands or a ping sweep – Internet Control Message Protocol sweep – to collect data about a specific target.