D1 Flashcards
(113 cards)
Describe risk owner
- overseeing the security measures.
- Regular review of security protocols
- and responding to any breaches or vulnerabilities that may arise
System that will selectively block or allow traffic based on the nature of the communication.
- Layer 4 Firewall
- VPN
- 802.1x
- Layer 7 Firewall
Layer 7 Firewall
Which layer do traditional firewalls operate at
Layer 4
PAKE
Password Authenticated Key Exchange:
method in which parties, based only on their knowledge of a shared password, establish a cryptographic key using an exchange of messages, such that an unauthorized party cannot participate in the method and is constrained as much as possible from brute-force guessing the password.
PMK
Pairwise Master Key:
Generated from passphrase by WPA2-PSK to encrypt communication
SAE
Simultaneous Authentication of Equals:
Replaces 4-wat handshake with different hillman agreement. protects against offline dictionary attacks
Dragonfly
authentication process used in WPA3, designed to be more secure than WPA2, and it’s based on the Simultaneous Authentication of Equals (SAE) protocol
SD-WAN
Software Designed Wide Area Network:
Provides centralized network management, flexible routing and traffic management capabilities. Can be hosted cloud or on-premise
SASE
Secure Access Service Edge
Cloud-based service integrating security and wide area networking
AH
Authentication Header:
Protocol component of IPSec which offers packet integrity
Environmental Variables
Characteristics of org’s infrastructure that can affect vulnerability assessment and risk analysis
SCADA security concerns
Not receive regular updates, making them susceptible to vulnerabilities over time
After remedying vulnerability, how to ensure steps were successful:
- rescanning
- patch management
- reviewing event logs
- threat modeling
Reviewing event logs: can be used to validate whether a vulnerability has been adequately addressed or is still causing issues
Policy-based access control
Part of Zero Trust. User access and permissions are set based on organizational policies, roles or requirements, ensuring users have access that aligns with their job functions or responsibilities
Role-Bases Access Control
Permissions assigned based on predefined roles in an org.
NGFW
Next-gen Firewall:
Incorporate advanced features like intrusion prevention, application awareness and deep packet inspection.
Stateful firewall
Keeps track of state of active connections and decides on packet allowance based on the context of traffic
Proxy firewall
Intermediary for requests from users seeking resources from other servers
Packet-filtering Firewall
Layer 3. network security device that inspects incoming and outgoing network packets based on predefined rules, typically based on IP addresses, ports, and protocols, to allow or block traffic
SPF
Sender Policy Framework:
Helps prevent email spoofing by enabling domain owners to define which servers can send emails on their behalf
DMARC
Domain-based Message Authentication, Reporting and Conformance:
Utilizes results from DKIM and SPF checks to determine the action to take with non-conforming messages
DKIM
Domain Keys Identified Mail:
Provides method to validate the domain name identity associated with a message through crypto authentication
RPO
Recovery Point Objective:
Maximum acceptable data loss, measured in time
MTBF
Mean Time Between Failure