Objective 2.1 - Security Concepts In An Enterprise Environment

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Configuration Management

help ensure that systems remain secure, even as the configurations change over the lifetime of systems

2
New cards

Diagrams for Configuration management

Network or physical diagrams

3
New cards

Baseline configuration

A collection of security and configuration settings that are to be applied to a particular system or network in the organization.

4
New cards

Standard naming conventions

Using the same conventions for assigning names to appliances.

5
New cards

Internet Protocol (IP) Schema

IP address plan or model that is consistent with network devices and helps avoid duplication of IP addresses, defines IP ranges, locations, and reserved addresses

6
New cards

data sovereignty

A term that refers to the legal implications of data stored in different countries. It is primarily a concern related to backups stored in alternate locations via the cloud.

7
New cards

Data Loss Prevention (DLP)

A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users.

8
New cards

Masking

modifying data to hide the original content. The primary reason for doing so is to protect sensitive information such as PII. The process retains usable data but converts it to inauthentic data

9
New cards

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

10
New cards

Data at rest

refers to any data stored on media and it's common to encrypt sensitive data. For example, it's possible to encrypt individual fields in a database, individual files, folders, or a full disk

11
New cards

Data in Transit (motion)

refers to any data sent over a network and its common to encrypt sensitive data in transit. For example e-commerce web sites commonly use HTTPS session to encrypt transactions that include credit card data. If attackers intercept the transmissions, they see only ciphertext

12
New cards

Data in processing

refers to data being used by a computer. Because the computer needs to process the data, it is not encrypted while in use. If the data is encrypted, an application will decrypt it and store it in memory while in use. If the application changes the data, it will encrypt it again before saving it.

13
New cards

Data Tokenization

replaces sensitive data elements with a token. The token is a substitute value used in place of sensitive data.

14
New cards

Rights Management

refers to the technologies used to provide copyright protection for copyrighted works.

15
New cards

Geographical considerations

Legal implications between states, countries, and continents that need to be considered before performing or operating in with your company, this applies to offsites ore recovery facilities

16
New cards

Response and recovery controls

Incident response plans should be established early on within a company that include documentation, identification of attacks, and how to contain them

17
New cards

SSL/TLS inspection

Commonly used to examine incoming and outgoing SSL/TLS packets, SSL/TLS relies on trusts mainly so if that's broken nothing works

18
New cards

Hashing

The process of calculating a numeric value from one or more data items. While this value obviously depends on the value of the data items, it need not depend on the meaning attached to them, simply producing a number that is used within the computer.

19
New cards

API considerations

An overarching term referring to practices and products that prevent malicious attacks on, or misuse of, Application Program Interfaces (API).

20
New cards

Site resiliency

The considerations that can be connected to the idea of restoration sites and their availability

21
New cards

Hot site

A separate and fully equipped facility where the company can move immediately after a disaster and resume business

22
New cards

Cold site

A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster

23
New cards

Warm site

A separate facility with computer equipment that requires installation and configuration

24
New cards

Deception and disruption

Cybersecurity resilience tools and techniques to increase the cost of attack planning for the threat actor.

25
New cards

Honeypots

false targets for computer criminals to attack

26
New cards

Honeyfiles

A file pretending to be legitimate, in order to detect malicious activity.

27
New cards

Honeynets

collection of honeypots connecting several honey pot systems on a subnet

28
New cards

Fake telemetry

Synthetic network traffic that resembles genuine communications, delivered at an appropriate volume to make honeynets and honeypots look real.

29
New cards

DNS sinkhole

Gives out false information in order to prevent the use of the domain names it represents