Security Flashcards
PKI
Public Key Infrastructure
CA
Certificate Authority
Digitally signs the certificate
Self-Signed Certificate
If only used internally at an organization, no need for a public CA
IAM
Identity and Access Management
Give right permissions to right users to prevent unauthorized access
- Identity Management
- Access Control
- Authentication
- Authorization
MFA
Multi-Factor Authentication
RBAC
Role Based Access Control
SSO
Single Sign-On
Only need to sign in one time then have access all day to many resources
RADIUS
Remote Authentication Dial-In User Service
Centralize authentication for users
- Routers, switches, firewalls, servers, VPN, 802.1X net access
LDAP
Lightweight Directory Access Protocol
Read/write from directory on net
like phone book
Username, PW
Also other data to use in setting permissions
- CN = Common name - person or unit
- OU = Org Unit
- O = Org
- L = Location
- ST = State
- C = Country
- DC = Domain Component
Example:
CN=WIDGETWEB, OU=Marketing, O=Widget, L=London, C=GB, DC=widget, DC=com
SAML
Security Assertion Markup Language
XML-based
Open standard for Authentication/Authorization
Can auth through 3rd party
TACACS+
Terminal Access Controller Access Control System Plus
Remote authentication
TOTP
Time-based One-Time Password
Use secret key and time of day to generate temp PW
Synch via NTP
CIA
Confidentiality
Integrity
Availability
Honeypot
Attract bad actors
Virtual world for attackers to explore
Honeynet
Larger fake network to attract attackers
Data Locality
Regulation that data gathered in country must remain in that country
GDPR
General Data Protection Regulation
European regulation
- PII kept in EU
- Users decide and can request removal
PCI DSS
Payment Card Industry Data Security Standard
Industry standard
Standard for protecting credit/debit card info/network
IIOT
Industrial Internet of Things
Machine to machine comms
SCADA
Supervisory Control and Data Acquisition
ICS
Industrial Control System
OT
Operational Technology
Tech that continued ops depend on - critical infrastructure
Guest Network
Guests can access but no access to organizational resources
VLAN Hopping
Switch Spoofing
- Pretend to be a switch
- Send trunk negotiation
Double Tagging
- Create a packet with two VLAN tags
- First tag is removed as it goes through a trunk, now second tag is visable and packet is forwarded to target
- One way trip, no response back out of network
- Change the native VLAN ID, Force tagging of all traffic on native VLAN