Send a link to your students to track their progress
475 Terms
1
New cards
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
2
New cards
Integrity
The process that guarantees that the data received is the same as originally sent. Useful for situations when someone intercepts your data on-the-fly and makes changes.
3
New cards
Nonrepudiation
Means that a person can't deny he/she/they took a specific action
4
New cards
Authentication
verifying the identity of the person or device attempting to access the system
5
New cards
Authorization
The process of giving someone permission to do or have something in regards to the data access
6
New cards
Cleartext
The unencrypted form of data. Also known as plaintext
7
New cards
Cipher
the generic term for a technique (or algorithm) that performs encryption
8
New cards
Ciphertext
A string of text that has been converted to a secure form using encryption.
9
New cards
Symmetric Key Encryption
Encryption system in which a single key is used for both encryption and decryption.
10
New cards
asymmetric key encryption
Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it.
11
New cards
Block Cipher
An encryption algorithm in which data is encrypted in "chunks" of a certain length at a time. Popular in wired networks.
12
New cards
Advanced Encryption Standard (AES)
A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.
13
New cards
Stream Cipher
An encryption method that encrypts a single bit at a time. Popular when data comes in long streams (such as with older wireless networks or cell phones).
14
New cards
public key cryptography
uses two keys: A public key the sender uses to create encrypted messages, and a mathematically-related private key that the receiver can use to decrypt messages encrypted by that public key.
15
New cards
RSA Encryption
RSA (Rivest-Shamir-Adleman) is the most common internet encryption and authentication system. The system used an algorithm that involves multiplying two large prime numbers to generate a public key, used to encrypt data and decrypt an authentication, and a private key, used to decrypt the data and encrypt an authentication.
16
New cards
DSA (Digital Signature Algorithm)
public key encryption standard used for digital signatures that provides authentication and integrity verification for messages.
17
New cards
ECDSA (Elliptic Curve Digital Signature Algorithm)
An asymmetric system which relies on a private key in the authenticator and a public key that the host uses to verify the authenticator.
18
New cards
hash function
a function that you run on a string of binary digits of any length that results in a value of some fixed length.
19
New cards
File hashing
Method for ensuring information validity. Involves a file being read by a special algorithm that uses the value of the bits in the file to compute a single large number called a hash value.
20
New cards
digital signature
an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
21
New cards
Certificate
a standardized type of file that includes a public key, info about the certificate, and the digital signature of a trusted third party
22
New cards
Trusted third party
a person or a company that vouches for the identity of whoever requested the certificate
23
New cards
Certificate Authority (CA)
An entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates.
24
New cards
Root authority
A certification authority that has no higher authority to vouch for it. The authority is at the top of a certification hierarchy.
25
New cards
Public Key Infrastructure (PKI)
System for creating public and private keys using a certificate authority (CA) and digital certificates for authentication.
26
New cards
Local Authentication
A login screen prompting a user to enter a user name and password to log into a Windows, macOS, or Linux computer.
27
New cards
Biometrics
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
28
New cards
multifactor authentication (MFA)
To use more than one method to authenticate access to a computer, network, or other resource.
29
New cards
Network Access Control (NAC)
A technique that examines the current state of a system or network device before it is allowed to connect to the network.
30
New cards
Access Control List (ACL)
A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.
31
New cards
Mandatory Access Control (MAC)
every resource is assigned a label that defines its security level. If the user lacks that security level, they don't get access
32
New cards
Discretionary Access Control (DAC)
The least restrictive access control model in which the owner of the object has total control over it.
33
New cards
Role-Based Access Control (RBAC)
A control system in which access decisions are based on the roles of individual users as part of an organization
34
New cards
Point-to-Point Protocol (PPP)
Enables two devices to connect, authenticate with a username and password, and negotiate the network protocol the two devices will use
35
New cards
User Authentication
the process of authenticating a username and password
36
New cards
Password Authentication Protocol (PAP)
A form of authentication in which clear text usernames and passwords are passed
Performs one-way authentication. However, authentication is performed through a three-way handshake (challenge, response, and acceptance messages) between a server and a client. The three-way handshake allows a client to be authenticated without sending credential information across a network.
38
New cards
Man-in-the-middle
A security attack in which network communication is intercepted in an attempt to obtain key data
39
New cards
Accounting
Logging events such as logins, session action, user bandwidth usage etc.
40
New cards
Remote Authentication Dial-In User Service (RADIUS)
One of the AAA standards that's used to support ISPs with hundreds of modems in hundreds of computers to connect to a single central database. Uses UDP port 1812 or 1645 and uses UDP ports 1813 and 1646 for accounting.
41
New cards
TACACS (Terminal Access Controller Access Control System)
Used by Cisco devices to support AAA in a network with many routers and switches. Uses TCP port 49 and separates authorization, authentication, and accounting into different parts.
42
New cards
Kerberos
An authentication protocol for TCP/IP networks with many clients all connected to a single authenticating server without the need for PPP. Uses UDP or TCP port 88
43
New cards
Windows Domain
A group of Windows computers that share common management and are subject to rules and policies that an administrator defines.
44
New cards
Domain Controller
A Windows server that has Active Directory installed and is responsible for allowing client computers access to domain resources.
45
New cards
Active Directory
A Windows server directory database and service that is used in managing a domain to allow for a single point of administration for all shared resources on a network, including files, peripheral devices, databases, Web sites, users, and services.
46
New cards
Key Distribution Center (KDC)
Supplies both session tickets and session keys in an Active Directory domain
47
New cards
Authentication Server
Used to compare the results of the client's hash of the username and password to its own hash and if they match, sends a Ticket Granting Ticket.
48
New cards
Ticket-Granting Ticket (TGT)
Generally has a lifespan in Windows of ten hours; timestamped
49
New cards
Ticket Granting Service
Authorizing each TGT for each client
50
New cards
access token
Contains a security identifier (SID) for the user, all of the SIDs for the groups to which the user belongs, and the user's privileges.
51
New cards
single sign-on (SSO)
Allows a user to authenticate once to gain access to multiple systems, without requiring the user to independently authenticate with each system.
52
New cards
SSH (Secure Shell)
a secure version of Telnet that's used to encrypt text during a remote communication
53
New cards
Tunneling
a process that encrypts each data packet to be sent and places each encrypted packet inside another packet
54
New cards
SSH tunnel
an encrypted link between SSH processes on two separate computers. Once an SSH link between the two entities is established, anything you enter into the client application is encrypted, sent to the server, decrypted, and then acted upon
55
New cards
SSL/TLS
An encryption layer of HTTP that uses public key cryptography to establish a secure connection.
56
New cards
IPSec
Used to encrypt traffic on the wire and can operate in both tunnel mode and transport mode. It uses tunnel mode for VPN traffic. IPsec is built into IPv6, but can also work with IPv4 and it includes both AH and ESP. AH provides authentication and integrity, and ESP provides confidentiality, integrity, and authentication. Uses port 500 for IKE with VPN connections.
57
New cards
HTTPS (Hypertext Transfer Protocol Secure)
An encrypted version of HTTP. It uses port 443.
58
New cards
Secure Copy Protocol (SCP)
A TCP/IP protocol used mainly on UNIX and Linux devices that securely transports files by encrypting files and commands.
59
New cards
CIA Triad
The industry standard for computer security since the development of the mainframe. The standard is based on three characteristics that describe the utility of information: confidentiality, integrity, and availability.
60
New cards
Confidentiality
The goal of keeping unauthorized people from accessing, seeing, reading, or interacting with systems and data.
61
New cards
Availability
Ensuring that systems and data are available for authorized users to perform authorized tasks, whenever they need them
62
New cards
Zero Trust
Security design paradigm where any request (host-to-host or container-to-container) must be authenticated before being allowed.
63
New cards
Defense in Depth
A defense that uses multiple types of security devices to protect a network. Also called layered security.
64
New cards
Separation of Duties
Identifying how people could abuse or misuse a system, determining what access they'd need to do so, and splitting up that access so that no individual has the ability to do it alone.
65
New cards
Network Threats
any form of potential attack against your network
66
New cards
External threats
Threats that originate outside an organization
67
New cards
Internal threats
Threats that originate within an organization
68
New cards
vulnerabilities
flaws in programs that can be exploited to either crash the system or take control of it
69
New cards
mitigate
steps to minimize the risk
70
New cards
Common Vulnerabilities and Exposures (CVE)
An online list of known vulnerabilities (and patches) to software, especially web servers. It is maintained by the MITRE Corporation.
71
New cards
exploit
an actual procedure for taking advantage of a vulnerability
72
New cards
attack
someone tries to compromise your organization or its systems
73
New cards
Spoofing
When someone pretends to be someone else with the intent of obtaining unauthorized data.
74
New cards
MAC Spoofing
Imitating another computer by means of changing the MAC address
75
New cards
IP spoofing
A type of spoofing whereby an intruder uses another site's IP address as if it were that other site
76
New cards
DNS (cache) poisoning
an attacker poisons a DNS server's cache to point clients to an evil Web server instead of the correct one.
77
New cards
Domain Name System Security Extensions (DNSSEC)
A suite of extensions that adds security to the Domain Name System (DNS) protocol by enabling DNS responses to be validated. Specifically, DNSSEC provides origin authority, data integrity, and authenticated denial of existence.
78
New cards
Protocol Abuse
anytime you do things with a protocol that it wasn't meant to do and that abuse ends up creating a threat
79
New cards
malformed packets
The process of injecting unwanted info into packets in an attempt to break another system
80
New cards
Zero-day attack
an attack that leverages a previously unknown vulnerability that we've had zero days to fix or mitigate
81
New cards
DHCP snooping
Switch process that monitors DHCP traffic, filtering out DHCP messages from untrusted sources. Typically used to block attacks that use a rogue DHCP server.
82
New cards
RA Guard
Enables the switch to block router advertisements and router redirect messages that are not sent from trusted ports or don't match a policy.
83
New cards
ARP cache poisoning
A man-in-the-middle attack, where the attacker associates his MAC address with someone else's IP address (almost always the router), so all traffic will be sent to him first. The attacker sends out unsolicited ARPs, which can either be requests or replies.
84
New cards
Dynamic ARP Inspection (DAI)
Relies on ARP information that DHCP snooping collects in the DHCP snooping binding database; it's essentially a list of known-good IP and MAC addresses.
85
New cards
Denial of Service (DoS)
A targeted attack on a server that provides some form of service on the Internet with the goal of making that service unable to process any incoming requests.
86
New cards
Physical attack
A person physically attacks the servers by going to where the servers are located and disrupting their ongoing network communications.
87
New cards
Distributed Denial of Service (DDoS)
An attack that uses multiple zombie computers (even hundreds or thousands) in a botnet to flood a device with requests.
88
New cards
Reflection
Sending requests that spoof the target server's IP address as the source IP address to otherwise normally operating servers such as DNS or NTP servers
89
New cards
Amplification
A tactic that focuses on sending small requests that trigger large responses reflected at your target
90
New cards
deauthentication attack
Denial-of-service (DoS) strike that disconnects a wireless host from WAP, so that the victim is forced to reconnect and exchange the wireless key multiple times; an attacker can then perform an offline brute-force cracking of the password.
91
New cards
DHCP scope exhaustion
running out of open address to assign
92
New cards
DHCP starvation attack
Spoofing packets to the DHCP server, tricking it into giving away all of its leases to which its victims are encouraged to switch to a rogue DHCP server that the attacker controls.
93
New cards
Unintentional Denial of Service attack
A system brought down by accident
94
New cards
Man-in-the-middle (MITM) attack
An attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those systems, reading or even changing the data and then sending the data on.
95
New cards
Session Hijacking
Intercepting a valid computer session to get authentication information to which it only tries to grab authentication information.
96
New cards
Password attack
Type of attack in which the attacker attempts to obtain and make use of passwords illegitimately
97
New cards
Brute Force
A password attack that attempts to guess a password. Online brute force attacks guess passwords of online systems. Offline attacks guess passwords contained in a file or database.
98
New cards
Dictionary attack
Uses a list of known words and partial words as the starting point for cracking passwords.
99
New cards
Trusted user
An account that has been granted specific authority to perform certain or all administrative tasks.
100
New cards
Untrusted user
An account that has been granted no administrative powers.