1/54
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Public Key Infrastructure (PKI)
system that manages encryption keys and digital certificates to provide secure communication, authentication, and data integrity over networks. It enables trust between users, devices, and systems.
SAML
(Security Assertion Markup Language) – An open standard for single sign-on (SSO) that allows identity providers (IdPs) to authenticate users and share login credentials with service providers (SPs) securely.
SOAP
Simple Object Access Protocol
RADIUS
(Remote Authentication Dial-In User Service)
provides centralized administration of dial-up, VPN, and wireless authentication, so it can be used with both 802.1x and the Extensible Authentication Protocol (EAP)
TACACS+
(Terminal Access Controller Access-Control System Plus) – A Cisco-developed AAA (Authentication, Authorization, and Accounting) protocol that encrypts the entire packet and operates over TCP (port 49) for secure network device administration.
RBAC
Role-Based Access Control
An access model that is controlled by the system but focuses on a set of permissions versus an individual’s permissions
IPSec
IP Security
Provides authentication and encryption of data packets to create a secure and encrypted communication path between two computers
Main Mode
Conducts three two-way exchanges between the peers, from the initiator to the receiver
Aggressive Mode
Uses fewer exchanges, resulting in fewer packets and faster initial connection than main mode
Authentication Header
security protocol in IPsec that provides data integrity, authentication, and anti-replay protection for IP packets but does not encrypt the data.
Encapsulating Security Payload
security protocol in IPsec that provides encryption, authentication, and data integrity to protect IP packets. Unlike Authentication Header (AH), ESP encrypts the data, making it unreadable to unauthorized parties.
Key Recovery Agent
Specialized type of software that allows the restoration of a lost or corrupted key to be performed