Messer Exam B Flashcards
(65 cards)
CRL
Certificate Revocation List:
a CRL is a type of blocklist of digital certificates that CAs deem as untrustworthy or that they are no longer willing to vouch for.
OCSP
Online Certificate Status Protocol:
an alternative to the certificate revocation list (CRL) and is used to check whether a digital certificate is valid or if it has been revoked.
CA
Certificate Authority:
a trusted third party that issues digital certificates to verify the identity of websites, users, and organizations.
CSR
Certificate Signing Request:
a message that asks a Certificate Authority (CA) to issue a digital certificate. Contains the public key.
Host-based Firewall
works as a shield directly on a server or endpoint device. It analyzes and directs network traffic flow. Its primary role is to enforce security policies that determine what kind of data packets can enter or leave the host system.
Anti-malware
software that protects computers from malware, which is software that can damage or destroy a computer.
Full Device Encryption
a security method for protecting sensitive data at the hardware level by encrypting all data on a disk drive
MDM
Mobile Device Management:
security software that lets organizations manage mobile devices like smartphones, tablets, and laptops.
OSINT
Open Source Intelligence:
the practice of gathering, analyzing, and using information from public sources
Hashing
the process of transforming any given key or a string of characters into another value.
Hashing is used to protect passwords, messages, and documents
Hashing is used to create digital signatures that can be verified with a public key
Digital Signature
a mathematical method that verifies the authenticity of a digital document or message.
Uses:
-to confirm that information came from the signer and hasn’t been changed.
-to protect information in digital messages or documents.
-to identify users.
SPF
Sender Policy Framework:
A DNS record that lists the IP addresses of authorized mail servers for a domain.
Used to stop phishing attacks
Key Escrow
a system that stores keys used to decrypt encrypted data. A third party, or escrow agent, holds the keys and can access them under certain conditions.
Journaling
Helps ensure data integrity by recording changes before they are committed
Can help restore data after a system crash or power failure
Obfuscation
a cybersecurity technique that makes information harder to understand or access.
Data in-Transit
Data at-Rest
Data in-Use
in-Transit: information that’s moving from one location to another, such as over a network or the internet.
at-Rest: data that is stored on a device, such as a computer or server, and is not being actively used. It can include files, spreadsheets, databases, and archived emails.
in-Use: information that is being actively used or processed by a user or application. In memory.
IPS
Intrusion Protection System:
An intrusion prevention system (IPS) is a network security tool that continuously monitors a network for malicious activity and takes action to prevent it.
Security Controls
Deterrent: security measures that discourage people from breaking security policies.
Compensating: alternative security measures used when primary controls are not feasible.
Directive: security measures that direct and guide activities to ensure compliance with security policies. They can include policies, mandates, and other directives.
Detective: detect, log, and alert to security incidents after they occur.
Data Owner
a person or group that manages and is accountable for an organization’s data. Senior manager.
Data Controller
A data controller manages the processing of the data. For example, a payroll department would be a data controller
Data Steward
The data steward manages access rights to the data. The IT team may be the data steward.
Data Processor
A third-party that processes data on behalf of
the data controller.
SDN
Software Defined Networking:
enables efficient network configuration to create grouping and segmentation while improving network performance and monitoring
Buffer Overflow
a vulnerability that lets a malicious hacker inject data into program memory and execute it by giving more data in user input than the program is designed to handle.