CH2 Flashcards
(14 cards)
The CIA Triad
Confidentiality, Integrity and Availability
Prevents denil of actions ensuring accountability and reliabilty in electornic communication and transactions
Non-Repuddation
Three key aspsects of Non Repudation
Digital Signatures, Audit Trails, Access Controls
What does an AAA Server do?
Authentication of people, Authentication of Systems, Auhtorization models, Accounting
AAA Protocols - which is a cornerstone of network security. Includes a variety of access devices includeing WAPS, routers and switches
RADIUS
AAA Protocol - Advanced version of Radius, used for 4G and 5G along with LTE and WIMAX
Diamter
AAA Protocol - Created by CISCO - Used for Firewalls, Routers and Switches
TACACS+
A stretegic process that evaluates an orgs security practices against established security standards, regualtions and best practices. This assessment ID’s discrepancies or gaps between the currnety security posture and desired state of security.
GAP Analysis
5 steps for a GAP Analysis
Assessment, Benchmarking, Identificaiton, Prioritzation, Remediation Strategy
Deception and Disruption Technology where security teams are trying to find out the attack methods that hackers are using. They use a website similar to a legitimate website with lower security. This is known as a what?
Honeypot
Groups of honeypost that give an apperance of a network. Used a decoy to draw attackers away from actual network
Honeynet
A file that acts as ruse, which sets off an alarm
Honeyfile
Designed to ensnare digital intruders and to track them and get info
Honeytoken