1.0 General Security Concepts

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Key Escrow

Where cryptographic keys are securely stored

ensures access to encrypted data when needed

Used to facilitate data recovery, ensure compliance with law or maintain business continuity

2
New cards

Asymmetric key encryption

Each party has a public/private key pair

Public key is used to encrypt data

Private key is used to decrypt it

Ensures only the intended recipient can decrypt the message

3
New cards

Symmetric Key encryption

The sharing of a common key beforehand for both encryption and decryption

key must be shared and kept secret between parties

4
New cards

Scheduled downtime

setting aside a specific period during which the system can be taken offline or updated without significantly affecting normal business operations

IT can ensure necessary changes are made while minimizing the impact on users and business activities

5
New cards

Maintenance windows

similar to scheduled downtime but does not involve taking system offline

Predefined period in which changes are implemented

helps in reducing the impact on users and allows for more controlled and secure implementation

6
New cards

Data Obfuscation

the process of disguising confidential or sensitive data to protect it from unauthorized access

7
New cards

HSM (Hardware Security Module)

ideal choice for cloud service providers needing to secure applications with high encryption demands

Physical devices designed to secure cryptographic keys and perform cryptographic operations within a tamper resistant hardware device

provides more secure and efficient environment for key management processes than software based based solution

ensures cryptographic keys are generated, stored, and managed in a hardware backed secure manner

8
New cards

Technical security controls

implemented in hardware, software, or firmware that automate the process of preventing, detecting, and responding to security threats

includes:

AC mechanisms

Firewalls

Encryption

Antivirus/antimalware

VPNs

9
New cards

Managerial Security controls

policies, procedures, guidelines that governthe behavior of people within an organization

Includes:

Security policies and procedures

Risk management

Incident response and recovery plans

Business continuity and disaster recovery planning

10
New cards

Operational security controls

methods and procedures that are implemented by an organization to ensure and maintain the security of its information and assets

Includes:

Security awareness training

physical media protection

backup and recovery procedures

configuration management

media protection

log monitoring

11
New cards

TPM (Trusted platform module)

tool for securely storing cryptographic keys used for disk encryption on laptops

provides hardware based, security related functions, including generating, storing, and limiting the use of cryptographic keys

unlike HSMs which are typically used in data centers and enterprise environments for managing keys at a larger scale

12
New cards

Secure enclave

provides highly secure spac within a device where sensitive data can be stored and cryptographic operation can be performed

ensures that sensitive data (fingerprints, facial recognition, or cryptographic keys) are stored in a segregated environment from the OS

isolated from main OS and CPU

tamper resistant

embedded in apple and android devices

13
New cards

Tokenization

substituting sensitive data with non sensitive equivalents

safeguards sensitive data while maintaining usability for certain processes or applications

14
New cards

OCSP (Online certificate status protocol)

ensures browsers and clients are immediately aware that a compromised certificate is no longer valid

allows browsers and clients to check the revocation status of certificates in real time

15
New cards

CRL (certificate revocation list)

contains the serial numbers of certificates that have been revoked

may require downloading a list that may not be immediately updates

16
New cards

Key stretching

implemented to enhance the security of stored passwords (especially for brute force attacks)

involves applying hashing functions multiple times or using cryptographic algorithm to make the hashing process computationally more demanding

increases time and effort required to crack each password

17
New cards

CA (certificate authority)

trusted entities that issue and manage security credentials and public keys for message encryption

issue digital signature wrapper to secure public keys

18
New cards

Registration authority

Process request for digital certificates

checks credentials and authenticates the users identity

does not issue certificates

19
New cards

RoT (root of trust)

a source that can always be trusted

foundation of cryptographic system and the central point of the chain of trust that system

can be a piece of hardwre (hardware root of trust) or software based

important in PKI 

does not provide digital certififacates

20
New cards

stream cipher 

encrypts plaintext data one byte or bit at a time

suitable for scenarios where the total message length is unknown

combines plain text with a separate randomly generated message derived from the key and an initialization vector (IV) 

21
New cards

Block cipher

encrypts data in equal-sized blocks (typically 128-bit)

requires padding if the plaintext doesn’t match the block size

22
New cards

policy driven access control

part of ZERO TRUST

user access and permissions are set based on organizational policies, roles, or requirements, ensuring that users have the right level of access that aligns with their job functions or responsibilities

23
New cards

Vulnerability management 

an operational security control that involves identifying, assessing, and remediating vulnerabilities in systems and networks.

Can help prevent security breaches by ensuring that vulnerabilities are addressed in a timely manner

24
New cards

Policy Administrator

responsible for defining and managing the access control policies used by the policy engine

25
New cards

Risk assessments

a managerial security control that involves regularly evaluating the threats to systems and networks

can help company identify potential threats and take steps to mitigate them

26
New cards

Blockchain

employs an expanding list of transactional records, each referred to as a block, and each block validates the hash of the previous block

ensures that historical transactions remain untampered with

27
New cards

Adaptive identity

allows for more flexible and dynamic access controls by using contextual data to make dynamic access control decisions

28
New cards

PKI (public key infrastructure)

set of roles, policies, and procdures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public key encryption

29
New cards

Wildcard Certificate 

can be used to secure multiple subdomains under a single main domain

offers a convenient/cost-effective way to manage certificates for subdomains

30
New cards

PEP (policy enforcement point)

responsible for ensuring that security policies are enforced when a user or device tries to access resources on the network

acts as a gatekeeper, verifying identity and context of the access request against the policies set by the organization before allowing or denying access

31
New cards

Technical security controls

measures put in place to protect the confidentiality, integrity, and availability of a system or network

includes firewalls, IDS/IPS, encryption, and access controls

32
New cards

Managerial security controls

measures that involve directing and overseeing the overall security of an organization

includes risk assessments, security awareness training, incident response planning, and service acquisition

33
New cards

TDE (transparent data encryption)

database encryption technology that provide the capability to encrypt entire databases

34
New cards

record level encryption

encrypts individual records within a database

35
New cards

salting 

adds random data to the input of a hash function to increase security

36
New cards

data plane

oversees the conveyance of data within zero trust

once control plane grants access, this plane steps in to make certain that data is transmitted efficiently and arrives at its intended destination

processes and transmits data between systems

37
New cards

SRTP (secure real time transport protocol)

provides encryption, message authentication, and integrity for voice communications over IP

designed to protect RTP (real-time transport protocol) and RTPCP (real time control protocol) traffic

38
New cards

Volume encryption

allows for encryption of a specific volume or virtual drive

allows for encryption of virtual disk on HD without encrypting entire disk

39
New cards

threat scope

aims to minimize the possible avenues or channels that could be exploited as part of the zero trust model

reduces attack surface

40
New cards

TPM (trusted platform module)

hardware based storage system that contains keys, digital certificates, hashed passwords, and many other types of information used for authentication

embedded in device motherboards that use windows

41
New cards

microwave sensors

uses electromagnetic signals and measures their reflection to detect movement or the presence of objects

42
New cards

ECC (elliptic curve cryptography)

type of trapdoor function that is efficient with shorter key lengths

no known shortcuts to cracking it

43
New cards

stakeholders

individuals or entities that have an interest in a particular decision or project

often represents various departments or groups

their feedback is critical for comprehensive decision making

44
New cards

policy engine 

responsible for making access control decisions based on pre defined policies and contextual information about subject/system