Sec+ Review Flashcards
(25 cards)
Name th 4 control categories
- Technical
- Managerial
- Operational
- Physical
What are the 6 control types
- Preventative
- Deterrent
- Detective
- Corrective
- Compensating
- Directive
What is the CIA triad
Confidentiality
Integrity
Availability
What is non- repudation
Prevents denial of actions
What upholds non- repudation
Digital sigs
Audit trails
Access control
What is AAA
Authentication
Authorization
Accounting
What is RADIUS
Remote authentication dial- in user service. Protocol to manage AAA for users to connect to a network.
5 stages of gap analysis
- Current assessments
- Benchmarking
- Identification where things fall short
- Prioritization
- Remediation
Zero trust control plane
Uses subject/identity with company policy, threat intelligence data to decide access
Data plane zones
- Implicit trust zone - trust assumed
- Internal network zone - lan
- Dmz - screened subnet
- External network
What does a honeypot do
Find attack methods
What does a honey file do
Lures attackers and sets off alarms
What is a honey tolken
Easily tracked dummy data
Fake info
Black hole of fake info
Change management considerations
Change advisory board
Approval process
Ownership
Stakeholders
Impact analysis
Yesterday results
Blackout plan
Maintenance windows
Sop’s
Tech implications
Documentation
4 Cryptographic tools for securing data
Obfuscation
Hashing
Signatures
Keys
What does a public key do
Encrypts data
Verify sigs
What does a private key do
Employs sig
Decryption
What is a key escrow
3rd party key safe
What is a hsm
Hardware security module for securing keys. Ensures integrity of boot, offers authentication, and supports encryption tasks.
Ssh encryption process
- 3 way handshake
- Encryption
- Transmission
- Decryption
Homomorphic encryption
Allows data to be processed while encrypted
What is a tpm
Trusted platform module. Specialized chip based key manager and os firmware.
What is a key management system
Software solution for keys