Chapter 2 Flashcards
(22 cards)
Confidentiality, Integrity and Availability (CIA)
Safeguards data confidentiality, integrity and accessibility.
Non-repudiation
Prevents denial of one’s actions, ensuring accountability.
Authentication, Authorization and Accounting (AAA)
Authenticating people: verifies person’s identity
Authenticating systems: Using 802.1x devices are authenticated
Authorization models: controls access permissions
Gap analysis
Helps you achieve the desired state security
Zero trust
Principle of “never trust, always verify”
Control plane
Manages and configures network devices and resources.
Adaptive identity
Flexible approach to identity management
Threat scope reduction
Reducing the attack surface
Policy engine
Enforces rules and policies
Policy administrator
Executes the policy engine’s decisions
Policy-driven access control
Automating the enforcement of directives
Implicit trust zones
Trusted areas holding resources
Subject/system
Identifies people/devices
Policy enforcement point
Monitors and enforces policies within the data plane
Physical security
Protects people, assets and infrastructure from threats
Pressure
A type of physical security that senses changes in force and translates them into electronic signals
Microwave
A type of physical security that emits microwave pulses and detects frequency alterations caused by moving objects
Ultrasonic
A type of physical security that sends out pulses of sound waves and measuring the time it takes for them to return
Honeypot
Lures attackers so that we can monitor the latest attack methods
Honeynet
A network of honeypots
Honeyfile
Bait file designed to detect and track unauthorized access attempts discretely
Honeytoken
Fictitious data or credentials placed as a trap to detect unauthorized access