Implementing Security Flashcards
(39 cards)
HIDS/HIPS
Host Based Intrusion Detection/Protection System
MDM
Mobile Device Management
EMM
Enterprise Mobility Management
MAM
Mobile Access Management
UEM
Unified Endpoint Management
Of MDM, EMM, MAM
MicroSD HSM
Micro SD card form Hardware Security Module
secures mobile devices
MSSP
Managed Security Service Provider
NIST
National Institute for Standards and Technology
CSA
Cloud Security Alliance
Prompting best practices in the cloud
CCM
Cloud Controls Matrix
Developed by the CSA to help organisations understand appropriate use of cloud security controls and map then to regularity stds
CASB
Cloud Access Security Broker
Software tools serving as intermediaries between service providers and users
EDR
Endpoint Detection and Response
Tools combining network response and log analysis.
Look for anomalies and IoC (indicator of compromise) using automated rules and detection
IPFIX
IP Flow Information Exchange
Serves as a means for transmitting traffic flow over the network (open net flow standard)
SIPS
Session Initiation Protocol Secure
For communications traffic like voice and video over HTTPS
SRTP
Real-Time Transport Protocol Secure
For voice and video communications
TLS
Transport Layer Security
Protocol used in HTTPS, VoIP, email and instant messaging
DMARC
Domain-based Message Authentication, Reporting & Conformance
For email and web traffic
DKIM
Domain Keys Identified Mail
DNSSEC
DNS Secure Protocol
UDP/TCP 53
Ensuring DNS is not modified or malicious using digital signatures
FTPS
FTP Secure using TLS
TCP 21 in explicit mode
TCP 990 in Implicit mode
SFTP
Secure FTP using SSH
TCP port 22
HTTPS
TCP using TLS port 443
IMAPS
Internet Mail Access Protocol Secure
Using TCP TLS port 993
LDAPS
Lightweight Directory Access Protocol Secure
Using TLS on TCP port 636