CompTIA Network+ (N10-009) Study Guide: Security Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/577

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

578 Terms

1
New cards

Identity and Access Management (IAM)

Security process for identification, authentication, and authorization of users, computers, and entities.

2
New cards

Personnel

Employees with user accounts and access to the system.

3
New cards

Endpoints

Devices (desktops, laptops, tablets, cell phones) used to access the network.

4
New cards

Servers

Machines for machine communication, containing mission-critical systems and encryption.

5
New cards

Software Roles

Applications requiring IAM, often using digital certificates.

6
New cards

Permissions

Define permissions based on the function an asset fulfills, applicable to personnel, endpoints, servers, and software.

7
New cards

IAM Systems and tools

Includes directory services and repositories, access management tools, and auditing and reporting systems.

8
New cards

Account Creation and Deprovisioning

Provisioning new accounts and disabling/deleting existing accounts.

9
New cards

Account Management

Involves resetting passwords and updating digital certificates.

10
New cards

Account Auditing

Reviewing account activity to ensure legitimacy.

11
New cards

Evaluating Identity-based Threats

Identifying and mitigating threats to IAM systems.

12
New cards

Maintaining Compliance

Ensuring the system meets security requirements and standards.

13
New cards

IAM Risks

Ensuring the system meets security requirements and standards; the biggest risk is the risk caused by accounts.

14
New cards

User Accounts

Standard accounts with basic permissions; least risky.

15
New cards

Privileged Accounts

Administrator, root, or superuser accounts with elevated permissions, requiring additional auditing.

16
New cards

Shared Accounts

Used in small office environments, posing a risk due to shared passwords and lack of individual accountability; not recommended.

17
New cards

Multifactor Authentication (MFA)

Means authenticating or proving identity using more than one method; at least two methods are required for MFA.

18
New cards

Two-factor Authentication (2FA)

A combination of two MFA categories; use 2FA to increase security.

19
New cards

Weaknesses of Passwords

Includes unchanged default credentials and common passwords.

20
New cards

Dictionary Attack

Guessing the password using every word or phrase in a dictionary, including variations like substituting symbols for letters.

21
New cards

Brute Force Attack

Trying every possible combination until the correct password is found.

22
New cards

Hybrid Attack

A combination of dictionary and brute force methods, using keywords related to the individual's life.

23
New cards

Prevention of password attacks

Password length and complexity; longer and more complex passwords are harder to crack.

24
New cards

Something You Have

A possession factor; examples include smart cards, RSA key fobs, and RFID tags.

25
New cards

Something You Are

An inherence factor; examples include fingerprints, retina scans, and voiceprints.

26
New cards

Something You Do

An action factor; the way a person signs his/her name, draws a pattern, or says a catchphrase.

27
New cards

Somewhere You Are

A location factor; geotagging is used to authenticate based on the current GPS location of a device.

28
New cards

Geofencing

Used to track devices and receive alerts if they enter or leave a predefined area; ensures that devices are in an authorized location for authentication.

29
New cards

Authentication

The process of determining whether someone or something is who/what they claim to be.

30
New cards

Local Authentication

Username/password verification stored locally; example includes personal laptop login.

31
New cards

LDAP (Lightweight Directory Access Protocol)

Centralized client/object database containing a hierarchal organization of the users, groups, servers, and systems in the network.

32
New cards

Kerberos

Validating user/password over the network; involves mutual authentication where the user verifies the server and the server verifies the user.

33
New cards

Key Distribution Center (KDC)

A component of the Kerberos protocol that manages the distribution of keys.

34
New cards

Ticket Granting Ticket (TGT)

A ticket used in authentication processes.

35
New cards

Service ticket/session key

A ticket used to access specific services after authentication.

36
New cards

Port 88

The network port used for Kerberos authentication.

37
New cards

SSO (Single Sign-On)

Single login for multiple resources.

38
New cards

Benefit of SSO

Simplifies access, reduces password management.

39
New cards

Drawback of SSO

Compromised credentials give access to all resources.

40
New cards

MFA

Multi-Factor Authentication can help keep secure access.

41
New cards

Example of SSO

Using Google account to log in to various services.

42
New cards

SAML (Security Assertion Markup Language)

XML-based authentication data exchange.

43
New cards

Roles in SSO or federated identity management

Service provider, User agent (e.g., web browser), Identity provider.

44
New cards

Example of SAML

Using Google as an identity provider to access a website.

45
New cards

RADIUS (Remote Authentication Dial-In User Service)

Centralized administration for authentication.

46
New cards

Usage of RADIUS

Dial-up, VPN, Wireless authentication.

47
New cards

Protocol for RADIUS

UDP.

48
New cards

Port 1812

The port used for RADIUS authentication.

49
New cards

Port 1813

The port used for RADIUS accounting.

50
New cards

TACACS+ (Terminal Access Controller Access-Control System Plus)

Cisco proprietary authentication/authorization.

51
New cards

Usage of TACACS+

802.1X network authenticator.

52
New cards

Protocol for TACACS+

TCP (slower than RADIUS).

53
New cards

Benefits of TACACS+

Can provide some additional security features.

54
New cards

Time-Based Authentication

A security mechanism that generates temporary dynamic passwords or tokens.

55
New cards

TOTP (Time-Based One-Time Passwords)

Most often implemented as part of MFA.

56
New cards

Benefit of Time-Based Authentication

Enhances security, resistant to replay attacks.

57
New cards

Implementation of Time-Based Authentication

Software (Google Authenticator), Hardware (RSA Key fob).

58
New cards

Least Privilege

Users should use the lowest level of permissions necessary to complete job functions.

59
New cards

Role-based Access

Methods of Access Control.

60
New cards

Discretionary Access Control (DAC)

Access control method where owners of resources determine access permissions.

61
New cards

Mandatory Access Control (MAC)

Access control policy where the computer system determines access.

62
New cards

Need-to-Know Principle

Users must have both the necessary clearance level and a need to know to access information.

63
New cards

Role-Based Access Control (RBAC)

Access control model based on defining roles for job functions.

64
New cards

Data Encryption

A fundamental method for securing data.

65
New cards

Unencrypted Data (Cleartext/Plaintext)

Easily accessible and viewable format.

66
New cards

Encrypted Data (Ciphertext)

Scrambled up and unreadable without the proper decryption key.

67
New cards

Benefits of Encryption

Mitigates risks associated with access control failures.

68
New cards

Data State

Location of data within a processing system.

69
New cards

Data at Rest

Data stored on memory, hard drives, or storage devices

70
New cards

Data in Transit/Motion

Data moving between systems or within a system

71
New cards

Data in Use/Processing

Data being read into memory or processed by the CPU

72
New cards

Internet Protocol Security (IPSec)

A secure network protocol suite that provides authentication and encryption of data packets to create a secure encrypted communication path between two computers over an internet protocol network

73
New cards

Confidentiality

Achieved through data encryption

74
New cards

Integrity

Ensured by hashing data before transmission and verifying upon receipt

75
New cards

Anti-replay

Prevents duplicate packet transmission and attacks involving captured and resent packets

76
New cards

Key Exchange Request

Initiates the VPN connection

77
New cards

IKE Phase 1

Authenticates parties and establishes a secure channel for negotiation

78
New cards

Diffie-Hellman key exchange

Utilizes Diffie-Hellman key exchange to create a shared secret key for establishing secure tunnels

79
New cards

IKE Phase 2

Conducts three two-way exchanges between the peers, from the initiator to the receiver

80
New cards

Aggressive Mode

Fewer exchanges for faster initial connection; less secure

81
New cards

Quick Mode

Only occurs after IKE already established the secure tunnel in Phase 1

82
New cards

Data Transfer

Allows data transfer over the secure tunnel using negotiated parameters

83
New cards

IPSec Tunnel Termination

Occurs when security associations are terminated through mutual agreement or due to timeout

84
New cards

Transport Mode

Uses original IP header; suitable for client-to-site VPNs

85
New cards

Tunneling Mode

Encapsulates the entire packet; suitable for site-to-site VPNs

86
New cards

Authentication Header (AH)

Provides data integrity and origin authentication, but not confidentiality

87
New cards

Encapsulating Security Payload (ESP)

Provides authentication, integrity, replay protection, and confidentiality of the data

88
New cards

Public Key Infrastructure (PKI)

A system of hardware, software, policies, procedures, and people that is based on asymmetric encryption

89
New cards

Asymmetric Encryption

Uses public and private keys for encryption and decryption

90
New cards

Public Key

Used to encrypt data.

91
New cards

Private Key

Used to decrypt data.

92
New cards

Authenticity

Verifies the identity of the data sender.

93
New cards

Certificate Authority (CA)

A trusted third party that issues digital certificates and maintains trust between CAs worldwide.

94
New cards

Key Escrow

Secure storage of cryptographic keys, allowing retrieval in cases of key loss or legal investigations.

95
New cards

Public Key Cryptography

Encryption and decryption process that is just one small part of the overall PKI.

96
New cards

PKI

Encompasses the entire system of managing digital keys and certificates.

97
New cards

AES

Used to create a secure tunnel for data transfer.

98
New cards

Digital Certificate

A digitally signed electronic document that binds a public key with a user's identity.

99
New cards

X.509 Protocol

Standard for digital certificates within PKI, containing owner/user information and certificate authority details.

100
New cards

Wildcard Certificate

Allows multiple subdomains to use the same public key certificate.