Method of protecting information using coded formats Data in transit - Data moving across network Data at rest - Stored, inactive data
2
New cards
Logical security(Certificates)
Digital documents used for identity validation Public key infrastructure (PKI) - Hierarchy of trust keys Self-signed - Generated without authority
3
New cards
Logical security(Identity and access management (IAM))
Framework for managing user identities and permissions Authentication - Verifies user identity Multifactor authentication (MFA) - Uses multiple verification factors Single sign-on (SSO) - One login for many apps Remote Authentication Dial-in User Service (RADIUS) - Centralized authentication protocol LDAP - Directory-based authentication service Security Assertion Markup Language (SAML) - Standard for identity exchange Terminal Access Controller Access Control System Plus (TACACS+) - Cisco authentication protocol Time-based authentication - Temporary time-sensitive codes Authorization - Determines user permissions Least privilege - Minimum access required Role-based access control - Permissions tied to roles
4
New cards
Logical security(Geofencing)
Security that restricts access by physical location
5
New cards
Physical security(Camera)
Video surveillance to monitor activity
6
New cards
Physical security(Locks)
Physical barriers preventing unauthorized access
7
New cards
Deception technologies(Honeypot)
Decoy system designed to lure attackers
8
New cards
Deception technologies(Honeynet)
Network of decoys to observe attacker behavior
9
New cards
Common security terminology(Risk)
Potential for harm from a threat
10
New cards
Common security terminology(Vulnerability)
Weakness that can be exploited
11
New cards
Common security terminology(Exploit)
Method of taking advantage of a vulnerability
12
New cards
Common security terminology(Threat)
Potential cause of harm to assets
13
New cards
Common security terminology(Confidentiality, Integrity, and Availability (CIA) triad)
Model for securing data and systems
14
New cards
Audits and regulatory compliance(Data locality)
Requirement to keep data in specific regions
15
New cards
Audits and regulatory compliance(Payment Card Industry Data Security Standards (PCI DSS))
Standards for protecting payment card data
16
New cards
Audits and regulatory compliance(General Data Protection Regulation (GDPR))
European law for personal data protection
17
New cards
Network segmentation enforcement(Internet of Things (IoT) and Industrial Internet of Things (IIoT))
Separation of consumer and industrial connected devices
18
New cards
Network segmentation enforcement(Supervisory control and data acquisition (SCADA), industrial control System (ICS), operational technology (OT))
Segmentation of critical infrastructure systems
19
New cards
Network segmentation enforcement(Guest)
Isolated network for visitor devices
20
New cards
Network segmentation enforcement(Bring your own device (BYOD))
Policy allowing personal devices with network restrictions