1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
RADIUS (Remote Authentication Dial-Up User Service)
A protocol that enables a single server to become responsible for all remote-access authentication, authorization, and auditing (or accounting) services. Functions as a client/server system
TACACS+ (Terminal Access Controller Access-Control System Plus)
A security protocol designed to provide centralized validation or users who are attempting to gain access to a router of NAS. Uses TCP on port 49 by default.
Kerberos
A non-proprietary protocol and is used for cross-platform authentication. This is also the main authentication protocol used with windows servers. This protocol used SSO and symmetric cryptography. Security tokens are called tickets.
Single Sign-On
A gateway service that permits users to log in once with a single user ID and password to gain access to multiple software applications.
Local Authentication
Authentication done locally by the OS using values stored in it.
LDAP (Lightweight Directory Access Protocol)
A communications protocol that defines how a client can access information, perform operations, and share directory data on a server.
Certificates
A key component of PKI. A form of electronic credentials that validates users, computers, or devices on the network. A digitally signed statement that associates the credentials of a public key to the identity of the person, device, or service that holds the corresponding key.
Auditing and Logging
The process of monitoring occurrences and keeping a log of what has occurred on a system. This helps prevent unauthorized access, provides a records for admins to analyze and make security changes, and provides solid evidence in case of improper misconduct.
Multifactor Authentication Something you Know
Certain knowledge only known to the user, such as a pssword.
Multifactor Authentication Something you have
Some physical object in the possession of the user
Multifactor Authentication Something you are
Some physical characteristic of the user, also known as biometrics
Multifactor Authentication Somewhere you are
Some connection to a specific computer network or using a GPS signal to identify the location
Multifactor Authentication Something you do
Proves identities by observing actions, such as gestures or touches
802.1x
The standard that defines port based security for wireless networks access control. Allows APs and switches to not do the authentication but instead rely on the authentication server to do the work.
NAC (Network Access Control)
A method to restrict access to the network based on identity or posture. Posture assessment any evaluation of a systems security based on setting and applications found.
Port Security
Disabling unused application/service ports to reduce the number of threat vectors.
MAC Filtering
A list of MAC addresses and configured to allow to deny access to certain systems based on the list
Captive Portal
Forces clients using a web browser to complete a task before being able to access the network.
Access Control Lists
Allow or disallow traffic based on tuples.
IMAP (Internet Message Access Protocol)
Technical solution that forces clients using web browsers to complete a specific process before it allows them access to the network