Section 1: Fundamentals of Security Flashcards
(167 cards)
DAC
Discretionary Access Control.
Authorization model where owner of the resource decides who is allowed to access the resource.
MAC
Mandatory Access Control.
Authorization model where access to resources is determined by a set or rules defined by the central authority.
RBAC
Role based access control.
Assigns permissions to roles rather than individual users.
Inline Devices
These devices are designed to interact with the network traffic actively and can take actions on packets.
SASE
Secure Access Service Edge.
Form of cloud architecture that combines a number of services as a single service. Reduces costs and simplify management, provides security, provides security by combining SD-WAN, firewall-as-a-service, secure web access, and ZTA access.
Fail-close
When a network encounters errors and exceptions the system will deny further access when an error occurs and will remain closed until delt with.
Due Diligence
Characteristics:
- assessing the security practices and confirming that they meet the organizations security requirements and standards
- evaluating financial stability of vendor
- ensure their practices comply with company’s own practice
- checking reputation
Cipher Block
A fixed-size portion of data that an encryption proccessess.
Layer 7 Firewall
operates at the application layer and can make more granular decisions about the traffic based on the applicaiton-payload
802.1x
IEEE standard that governs port-based access.
Layer 4 Firewall
operates at the transport layer and provides less granularity for blocking or allowing traffic based on the application payload
SD-WAN
Software-defined wide area network.
Provides centralized network management, flexible routing, and traffic management capabilities. It can be hosted on-prem or in cloud.
TLS
Transport Layer Security.
Operates on layer 7 and is used for securing application layer communication. Used for secure network communication.
AH
Authentication Header.
Protocol component of IPsec which offers packet integrity.
WPA2-PSK
Wi-Fi Protected Access 2—Pre-Shared-Key.
This is the WPA2 Personal mode authentication process that leverages a passphrase to create a key called the PMK.
PMK
Pairwise Master Key.
Dragonfly Handshake
A feature of WPA3s SAE method.
SAE
Simultaneous Authentication of Equals
PAKE
Password Authentication Key Exchange.
Is for SAE protocol.
End-of-life Vulnerability
Can allow hardware attack that involves exploiting vulnerabilities in devices that are no longer supported or updated by the manufacturer. These are still usable.
Shadow IT
Threat actor resulting from unauthorized or unapproved IT systems or devices within an organization. The employee is not usually intending harm.
TOC Vulnerability
Time-of-Check Vulnerability
Attacker exploits the time gap between the verification of data and its use, potentially leading to unauthorized or malicious activities.
Risk Tolerance
An organization predetermined level of acceptable risk exposure. It represents the extent to which an organization is willing to tolerate potential risks before taking action to mitigate or avoid them.
Risk Appetite
Refers to the amount of risk an organization is willing to take on to achieve its strategic objectives.