• Logical security
▸ Encryption
▸ Data in transit
▸ Data at rest
▸ Certificates
▸ Public key infrastructure (PKI)
▸ Self-signed
▸ Identity and access management (IAM)
▸ Authentication
▸ Multifactor authentication (MFA)
▸ Single sign-on (SSO)
▸ Remote Authentication Dial-in User Service (RADIUS)
▸ LDAP
▸ Security Assertion Markup Language (SAML)
▸ Terminal Access Controller Access Control System Plus (TACACS+)
▸ Time-based authentication
▸ Authorization
▸ Least privilege
▸ Role-based access control
▸ Geofencing
• Physical security
▸ Camera
▸ Locks
• Deception technologies
▸ Honeypot
▸ Honeynet
• Common security terminology
▸ Risk
▸ Vulnerability
▸ Exploit
▸ Threat
▸ Confidentiality, Integrity, and Availability (CIA) triad
• Audits and regulatory compliance
▸ Data locality
▸ Payment Card Industry Data Security Standards (PCI DSS)
▸ General Data Protection Regulation (GDPR)
• Network segmentation enforcement
▸ Internet of Things (IoT) and Industrial Internet of Things (IIoT)
▸ Supervisory control and data acquisition (SCADA), industrial control system (ICS), operational technology (OT)
▸ Guest
▸ Bring your own device (BYOD)