Section 16: Logical Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards
Logical security
Measures that protect digital access to systems and data, such as passwords, ACLs, and encryption.
2
New cards
Access Control List (ACL)
A set of rules that allow or deny network traffic based on IP, MAC, or port numbers.
3
New cards
Principle of least privilege
Users should be given only the minimum level of access needed to perform their tasks.
4
New cards
Components of IAM
Identification, Authentication, Authorization.
5
New cards
802.1X
Port-based network access control that uses RADIUS or EAP for authentication.
6
New cards
DAC (Discretionary Access Control)
Allows owners to set permissions for their resources.
7
New cards
MAC (Mandatory Access Control)
Enforces security labels system-wide and restricts access based on these labels.
8
New cards
Multifactor Authentication (MFA)
Authentication using three factors: Something You Know, Something You Have, Something You Are.
9
New cards
TOTP
Time-Based One-Time Password, a temporary code that changes every 30-60 seconds.
10
New cards
Push notification MFA
A method where a user receives a push alert to approve or deny access instead of entering a code.
11
New cards
SAML
Security Assertion Markup Language, enables single sign-on (SSO) across multiple services.
12
New cards
OAuth
Allows secure third-party access to resources without sharing passwords.
13
New cards
CIA Triad
Confidentiality, Integrity, Availability – the three core principles of cybersecurity.
14
New cards
Defense in depth
A layered security approach using multiple security controls to protect a system.
15
New cards
Symmetric encryption
Uses one key for both encryption and decryption.
16
New cards
Asymmetric encryption
Uses two keys: a public key to encrypt and a private key to decrypt.
17
New cards
IPSec Transport Mode
Encrypts only the payload of the packet for host-to-host communication.
18
New cards
IPSec Tunnel Mode
Encrypts the entire IP packet, commonly used in VPNs.
19
New cards
ESP (Encapsulating Security Payload)
Provides encryption, integrity, and authentication in IPSec.
20
New cards
IKE (Internet Key Exchange)
A protocol that automates the setup of secure IPSec connections.
21
New cards

Public Key Infrastructure (PKI)

system that manages encryption keys and digital certificates to provide secure communication, authentication, and data integrity over networks. It enables trust between users, devices, and systems.

22
New cards
Certificate Authority (CA)
A trusted entity that issues and verifies digital certificates.
23
New cards
Certificate Revocation List (CRL)
A list of revoked digital certificates that are no longer trusted.
24
New cards
Digital certificate
Verifies the identity of websites, individuals, or organizations using public-key cryptography.
25
New cards
SSL/TLS certificate
A digital certificate that secures websites using HTTPS encryption.
26
New cards
Key management
The process of generating, storing, distributing, and revoking encryption keys securely.
27
New cards
Key escrow
A security measure where a trusted third party holds encryption keys for recovery.
28
New cards
Perfect Forward Secrecy (PFS)
Ensures compromising one encryption key does not affect past or future sessions.
29
New cards
VLAN hopping
A network attack gaining access to unauthorized VLANs by exploiting misconfigurations.
30
New cards
MAC flooding attack
An attack overwhelming a switch’s MAC address table, forcing it to send traffic to all ports.
31
New cards
ARP spoofing attack
An attack sending fake ARP replies to redirect traffic to an attacker’s machine.
32
New cards
DNS poisoning attack
Corrupts DNS cache, redirecting users to malicious sites.
33
New cards
On-path attack
An attack where communication between two parties is intercepted and altered.
34
New cards
Rogue access point
An unauthorized Wi-Fi access point used for attacks like eavesdropping.
35
New cards
Honeypot
A security tool designed to lure attackers and study their behavior.
36
New cards
DoS attack
Denial of Service attack that overwhelms a system, making it unavailable.
37
New cards
DDoS attack
Distributed Denial of Service attack using multiple devices to overload a system.
38
New cards
Social engineering
Attackers manipulate people into giving up confidential information.
39
New cards
Phishing
A fraudulent attempt to trick users into providing sensitive information.
40
New cards
Malware
Malicious software designed to damage, steal data, or disrupt systems.
41
New cards
Risk management
The process of identifying, assessing, and mitigating security risks.
42
New cards
Security risk assessment
Evaluating security risks and determining how to address them.
43
New cards
PCI DSS
Payment Card Industry Data Security Standard for companies handling credit card transactions.
44
New cards
GDPR
General Data Protection Regulation, a European law to protect personal data.
45
New cards

SAML

(Security Assertion Markup Language) – An open standard for single sign-on (SSO) that allows identity providers (IdPs) to authenticate users and share login credentials with service providers (SPs) securely.

46
New cards

SOAP

Simple Object Access Protocol

47
New cards

RADIUS

(Remote Authentication Dial-In User Service)

provides centralized administration of dial-up, VPN, and wireless authentication, so it can be used with both 802.1x and the Extensible Authentication Protocol (EAP)

48
New cards

TACACS+

(Terminal Access Controller Access-Control System Plus) – A Cisco-developed AAA (Authentication, Authorization, and Accounting) protocol that encrypts the entire packet and operates over TCP (port 49) for secure network device administration.

49
New cards

RBAC

  • Role-Based Access Control

  • An access model that is controlled by the system but focuses on a set of permissions versus an individual’s permissions

50
New cards

IPSec

  • IP Security

  • Provides authentication and encryption of data packets to create a secure and encrypted communication path between two computers

51
New cards

Main Mode

Conducts three two-way exchanges between the peers, from the initiator to the receiver

52
New cards

Aggressive Mode

Uses fewer exchanges, resulting in fewer packets and faster initial connection than main mode

53
New cards

Authentication Header

security protocol in IPsec that provides data integrity, authentication, and anti-replay protection for IP packets but does not encrypt the data.

54
New cards

Encapsulating Security Payload

security protocol in IPsec that provides encryption, authentication, and data integrity to protect IP packets. Unlike Authentication Header (AH), ESP encrypts the data, making it unreadable to unauthorized parties.

55
New cards

Key Recovery Agent

Specialized type of software that allows the restoration of a lost or corrupted key to be performed