4. Network Security Flashcards
This ensures that information can only be accessed by those who are authorized.
Confidentiality
This ensures that data is accurate and has not been tampered with.
Integrity
This ensures that systems and data are accessible when needed.
Availability
This refers to protecting data while it’s being transmitted over a network.
Data in Transit
This refers to protecting stored data on hard drives, backups, or cloud storage.
Data at Rest
This is used to encrypt and verify data, often issued by a trusted authority.
Certificate
A system for managing encryption keys and digital certificates.
PKI (Public Key Infrastructure)
A certificate that is not signed by a certificate authority (CA), often used internally.
Self-Signed Certificate
This is the process of verifying a user’s identity.
Authentication
This uses two or more types of credentials (e.g., password + phone) to verify identity.
Multifactor Authentication (MFA)
This allows users to log in once and access multiple systems without re-entering credentials.
Single Sign-On (SSO)
A centralized AAA protocol commonly used for remote network access.
RADIUS
An open protocol used to access and manage directory information (usernames, groups, etc.).
LDAP
This XML-based protocol is used for exchanging authentication and authorization data between parties.
SAML
A Cisco-developed AAA protocol that provides detailed command control.
TACACS+
Uses time-based algorithms (like TOTP) for generating temporary access codes.
Time-Based Authentication
Determines what a user is allowed to do after authentication.
Authorization
The principle of giving users only the access they need to do their job.
Least Privilege
Access control based on job responsibilities or organizational roles.
Role-Based Access Control (RBAC)
A security method that restricts access based on physical location.
Geofencing
Physical devices that monitor activity visually.
Security Cameras
A physical access control method that requires a key or code.
Locks
A decoy system set up to attract attackers and detect intrusions.
Honeypot
A controlled network of honeypots used to observe attacker behavior.
Honeynet