Term
|
Definition
Confidentiality Integrity Availability |
|
|
Term
Operational Model of Security |
|
Definition
Protection = Prevention + Detection + Response |
|
|
Term
|
Definition
Give only the absolute minimum rights and privileges needed |
|
|
Term
|
Definition
Multiple barriers working in conjunction help eliminate single points of failure |
|
|
Term
|
Definition
Layers of security should be implemented using dissimilar methods and vendors.
Layers should be so dissimilar that if one layer is penetrated, the next layer cannot be penetrated using the same method. |
|
|
Term
Security Through Obscurity |
|
Definition
Ice cream hidden in the back of the freezer will be found |
|
|
Term
Keep it Simple (Stupid) (KISS) |
|
Definition
1. Turn off nonessential services, etc 2. Complex systems are difficult to secure |
|
|
Term
|
Definition
The ability of a subject to interact with an object |
|
|
Term
Access Control List (ACL) |
|
Definition
A list stating who has specific types access to what |
|
|
Term
Discretionary Access Control (DAC) |
|
Definition
Access control based on identity of subjects or groups to which they belong
*Certain subjects (eg "Owner") may pass permissions on to any other subject |
|
|
Term
Mandatory Access Control (MAC) |
|
Definition
Access control based on levels of sensitivity assigned to objects (Labels) and formal levels of authorization (ie clearance) of subjects.
These relationships are strictly enforced. |
|
|
Term
Role-Based Access Control (RBAC) |
|
Definition
Access control based on subjects being assigned certain roles. Access control is managed at the role level instead of the subject level. |
|
|
Term
|
Definition
Verifying the identity of a subject |
|
|
Term
3 general Authentication methods |
|
Definition
1. Something you know (ie password) 2. Something you have (ie token) 3. Something you are (ie biometrics) |
|
|
Term
|
Definition
Network authentication protocol
Ticket, Authentication Server(AS) Time-based
Driver's license analogy? |
|
|
Term
|
Definition
|
|
Term
|
Definition
Challenge Handshake Protocol -authentication across a point-to-point link using PPP -challenge/response (3-way handshake) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Hardware device? used in authentication (something you have) (e.g. RSA secureToken) |
|
|
Term
Multifactor Authentication |
|
Definition
Uses more than one authentication mechanism at the same time (ie ATM card + PIN) |
|
|
Term
|
Definition
Authentication of both sides of a communication. Helps prevent man-in-the-middle attacks. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Nonrepudiation is a way to guarantee that senders cannot deny they sent a message |
|
|
Term
|
Definition
|
|
Term
|
Definition
Denial of Service Attacks aim to disrupt the availability of services |
|
|
Term
|
Definition
DOS attack exploiting the TCP 3-way handshake. A multitude of SYN requests are sent to the target. The target responds with a SYN/ACK and waits for a default period for an ACK. The attacker will never reply so the target may use up all it available connections. |
|
|
Term
|
Definition
Distributed Denial of Service attacks rely on using multiple computers to conduct DOS attacks. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Making data look like it's coming from a different source than it is. |
|
|
Term
|
Definition
DOS attack where the attacker sends ICMP echo requests to the broadcast address of a network with the From address spoofed to be the IP address of the target. |
|
|
Term
|
Definition
An attack in which the attacker will intercept communications between two parties and modify the messages between them.??? |
|
|
Term
|
Definition
Attackers "record" portions of conversations (eg authentication sequences) and then replay them at a later time |
|
|
Term
|
Definition
A method of finding a cryptographic or other key by systematically trying all possible combinations of keys |
|
|
Term
|
Definition
A method of breaking a cryptographic or other system by attacking the implementation of the system/algorithm rather than the system itself (ie using a weakness in a key exchange to find a key rather than using a brute-force attack) |
|
|
Term
|
Definition
A method of finding a key by trying many commonly used or probable keys (ie guessing a password using all the words in an English dictionary) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Malicious software that self-replicates by copying itself to other executable files. |
|
|
Term
|
Definition
Malicious software that masquerades as useful software. Trojans rely on the end-user to run them. |
|
|
Term
|
Definition
Malicious software installed by an authorized user that is designed to drop it's payload at a designated time or after a set of conditions ha been met |
|
|
Term
|
Definition
Malicious, self-replicating software that runs stand-alone/without the need for a host |
|
|
Term
|
Definition
Con-artistry. An indirect attack on a system that relies on the inherent trusting nature, or gullibility of human beings. |
|
|
Term
|
Definition
Listening for the presence of wireless networks while driving |
|
|
Term
|
Definition
Standard, insecure TCP/IP remote terminal session protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
Secure Shell - ???????????? |
|
|
Term
|
Definition
|
|
Term
|
Definition
The encapsulation of one packet in another.
Encapsulation can allow you to obfuscate communications or to change the network transport method.
The contents of the data traveling within a tunnel only needs to be understood by the tunnel end-points. |
|
|
Term
|
Definition
Point-to-Point Tunneling Protocol -Layer 2 |
|
|
Term
|
Definition
???Point-to-Point Protocol - isawidelyusedprotocolforestablishingdial-incon- nectionsoverseriallinesorISDNservices.PPPhasseveralauthenticationmechanisms, includingPasswordAuthenticationProtocol(PAP),ChallengeHandshakeAuthentica- tionProtocol(CHAP),andtheExtensibleAuthenticationProtocol(EAP).Theseproto- cols are usedtoauthenticate the peer device, not a user of the system. PPPis a standardizedInternetencapsulationofIPtrafficoverpoint-to-pointlinks,suchasserial lines. The authentication process is performed only when the link is established. |
|
|
Term
|
Definition
Generic Routing Encapsulation(GRE) |
|
|
Term
|
Definition
|
|
Term
|
Definition
Public switched telephone network = POTS |
|
|
Term
|
Definition
Plain Old Telephone Service = PSTN |
|
|
Term
|
Definition
/?? Layer 2 Tunneling Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Wired Equivalent Privacy - fail 40 or 128bit RC4 stream cipher Static shared secret, variable initialization vector |
|
|
Term
|
Definition
Virtual Private Network- an encrypted tunnel between two nodes over a public network. |
|
|
Term
|
Definition
??? IP Security - IETF based Layer 3 set of protocols for the secure exchange of packets
IPsec has two defined methods—transport and tunneling—and these two methods provide different levels of security.IPsec also has three modes of connection: host to server, server to server, and host to host. |
|
|
Term
|
Definition
Encrypts only the data portion of the packet, still exposing the source and destination address. "content protection" |
|
|
Term
|
Definition
Encrypts the entire packet including the source and destination addresses, and the data portion. The encrypted packet must be encapsulated. (Context protection) |
|
|
Term
|
Definition
Obfuscation of the data within a conversation |
|
|
Term
|
Definition
Obfuscation of the identity of the sender and receiver of data |
|
|
Term
Diffie-Hellman Key Exchange |
|
Definition
|
|
Term
Authentication Header (AH) |
|
Definition
IPsec uses two protocols to provide traffic security. when added to an IP datagram, ensures the integrity of the data and also the authenticity of the data’s origin. By protecting the non-changing elements in the IPheader,the AH protects the IPaddress,which enables data-origin authentication. |
|
|
Term
Encapsulating Security Payload (ESP) |
|
Definition
IPsec uses two protocols to provide traffic security:
TheEncapsulatingSecurityPayload(ESP)providessecurityservicesforthe higher-level protocol portion of the packet only, not the IP header. |
|
|
Term
Internet Security Association and Key Management Protocol (ISAKMP) |
|
Definition
For key management and exchange, three protocols exist: • Internet Security Association and Key Management Protocol (ISAKMP) • Oakley • Secure Key Exchange Mechanism for Internet (SKEMI) ThesekeymanagementprotocolscanbecollectivelyreferredtoasInternetKeyManage- ment Protocol (IKMP) or Internet Key Exchange (IKE). |
|
|
Term
|
Definition
For key management and exchange, three protocols exist: • Internet Security Association and Key Management Protocol (ISAKMP) • Oakley • Secure Key Exchange Mechanism for Internet (SKEMI) ThesekeymanagementprotocolscanbecollectivelyreferredtoasInternetKeyManage- ment Protocol (IKMP) or Internet Key Exchange (IKE). |
|
|
Term
Secure Key Exchange Mechanism for Internet (SKEMI) |
|
Definition
For key management and exchange, three protocols exist: • Internet Security Association and Key Management Protocol (ISAKMP) • Oakley • Secure Key Exchange Mechanism for Internet (SKEMI) ThesekeymanagementprotocolscanbecollectivelyreferredtoasInternetKeyManage- ment Protocol (IKMP) or Internet Key Exchange (IKE). |
|
|
Term
IPSec "security association" |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
?????Remote Authentication Dial-In User Service |
|
|
Term
|
Definition
|
|
Term
|
Definition
???DIAMETERisaproposednameforthenewAAAprotocolsuite,designatedbytheIETF toreplacetheagingRADIUSprotocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Access Control, Authentication, Auditing Comptia |
|
|
Term
MIT Kerberos Maximum Time Delta |
|
Definition
|
|
Term
Microsoft Kerberos Maximum Time Delta |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
network sniffer (formerly ethereal) |
|
|
Term
|
Definition
AS - Authentication Server TGS - Ticket Granting Server |
|
|
Term
Ticket Granting Ticket (TGT) |
|
Definition
Cached Authentication Credential from TGS allows client to request Session Ticket |
|
|
Term
|
Definition
Authentication Credential from KDC allows client access to resource server |
|
|
Term
|
Definition
????EAP, defined by RFC 3748, is an authentication framework providing a functionality for a variety of authentication mechanisms. It does not provide encryption itself, but rather the ability to utilize several encryp- tion methods within an authentication construct. |
|
|
Term
|
Definition
???? EAP-TLS is considered a very secure form of authentication as it employs the security of TLS, which is the successor to SSL, and makes use of both server-side and client-side certificates. Although considered very secure (especially when client-side certificates are stored on devices like Smart Cards), the overhead of this form of authentication keeps it from being a more frequently implemented solution. |
|
|
Term
|
Definition
?????EAP-TTLS also provides very good security utilizing Public Key Infrastructure (PKI) certificates on the authentication server only to create a tunnel between the client and the server. |
|
|
Term
|
Definition
????PEAP is the result of a joint development effort from Microsoft, Cisco Systems, and RSA Security. Like EAP-TTLS, it provides security via server- side PKI certificates. There are at least two sub-types of PEAP certified for the WPA and WPA2 standard: PEAPv0/EAP-MSCHAPv2 (Microsoft Challenge Handshake Authentication Protocol) and PEAPv1/EAP-GTC (Generated Token Card) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
??? Message Digest Algorithm/Challenge-Handshake Authentication Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
RE:TUNNELING The protocol used by the network (IP on the Internet) that the information is traveling over |
|
|
Term
|
Definition
RE: TUNNELING This term includes both the tunneling protocol (PPTP,L2TP) and the encrypting protocol (IPSec,Secure Shell [SSH]) that is wrapped around the original data |
|
|
Term
|
Definition
RE: TUNNELING The original data being carried |
|
|
Term
3 protocols required for tunneling |
|
Definition
Carrier Protocol Encapsulating Protocol Passenger Protocol |
|
|
Term
|
Definition
site-to-site and remote access |
|
|
Term
|
Definition
virtual private dial-up network |
|
|
Term
|
Definition
|
|
Term
TACACS+ Transport Protocol |
|
Definition
|
|
Term
RADIUS Transport Protocol |
|
Definition
|
|
Term
TACACS Transport Protocol |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
L2TP uses _______ for encrypted tunnels |
|
Definition
|
|
Term
PPTP only works over ___ networks |
|
Definition
|
|
Term
|
Definition
|
|
Term
IPSec Mode where only the data(payload) is encrypted |
|
Definition
|
|
Term
IPSec Mode where data and IP headers are encrypted |
|
Definition
|
|
Term
|
Definition
Internet Key Exchange is used to authenticate the two ends of a secure tunnel by providing a secure exchange of a shared key before IPSec transmissions begin. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Hashed Message Authentication Code |
|
|
Term
|
Definition
Multi-Purpose Internet Mail Extensions |
|
|
Term
S/MIME encryption algorithms |
|
Definition
|
|
Term
|
Definition
Pretty Good Privacy ????????????? |
|
|
Term
|
Definition
|
|
Term
FCrDNS - Forward Confirmed reverse DNS |
|
Definition
Verifies that an email's originating IP address matches the fqdn used in the email's "from address" by doing a reverse DNS lookup on the IP, a nslookup on the fqdn, and then comparing. |
|
|
Term
|
Definition
a vulnerability that is not known to the security public and therefore no protections, patches, or detection signatures exist for it |
|
|
Term
cipher text attack?? pgp???
PGP can fall victim to a _________________ attack,which occurs when a hacker creates a message and sends it to a targeted userid with the expectation that this user will then send the message out to other users.When a targeted user distributes a message to others in an encrypted form,a hacker can listen to the transmitted messages and figure out the key from the newly created ciphertext. |
|
Definition
|
|
Term
|
Definition
System located in a DMZ that has been hardened against hackers |
|
|
Term
|
Definition
|
|
Term
|
Definition
Every part of a network that lies on the inside of the last firewall from the Internet |
|
|
Term
|
Definition
a server that sits between an intranet and its Internet connection and handles requests to access internet resources on behalf of intranet clients |
|
|
Term
|
Definition
Networking zone walled off from the general public, but open to certain authenticated hosts. Access to an extranet does not give access to the intranet. |
|
|
Term
|
Definition
honeypot is a computer system/network that is deliberately exposed to public access for the express purpose of attracting and distracting attackers. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
NSA for clipper and capstone chips, requires key escrow (ie nsa has your secrets) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
designed to be fast on 32bit procs |
|
|
Term
|
Definition
|
|
Term
|
Definition
RSA variable length block-cipher |
|
|
Term
|
Definition
RSA variable length stream cipher |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Message authentication code is a key-dependent one-way hash function. |
|
|
Term
|
Definition
freeware electronic-mail security program, originally designed by Philip Zimmermann [1652]. It uses IDEA for data encryption, RSA (with keys up to 2047 bits) for key management and digital signatures, and MD5 as a one-way hash function. Key distribution and revocation is done ad-hoc w/ a web of trust model |
|
|
Term
|
Definition
Log File Monitor is an IDS that reads log files to determine if the network is under attack |
|
|
Term
|
Definition
System Integrity Verifier is an IDS that notifies when essential files have changed |
|
|
Term
|
Definition
Key Hashing for Message Authentication Code is used to digitally sign packets on IPSec connections |
|
|
Term
|
Definition
|
|
Term
Number of rounds for 3DES |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
802.11 Media Access method |
|
Definition
|
|
Term
802.3 Media Access Method |
|
Definition
|
|
Term
WEP Low Security key size |
|
Definition
|
|
Term
WEP high security key size |
|
Definition
|
|
Term
X.509 version 1 certificate (vs version 2 & 3) |
|
Definition
|
|
Term
Bluetooth promiscuous security mode |
|
Definition
|
|
Term
|
Definition
SM1(promiscous) < SM2 (establish security after pairing) < SM3 (establish security required first) |
|
|
Term
Microsoft's Tunneling Protocol |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
L2TP Packet Header Protocol Field Number |
|
Definition
|
|
Term
TCP Packet Header Protocol Field Number |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|