Security
Access Control
MISC(HARD)
Its A Disaster
Network Monitoring
100

Layered Approach to securing

computer systems

Defense in Depth

100

A security model in which access rights and permissions are determined by the owner of the resource

DAC(Discretionary Access Control)

100

Duplicate the Problem is what

part of the troubleshooting steps

Identify the Problem

100

average amount of time that

passes before a piece of

hardware fails

MTBF(Mean Time Between Failure)

100

A tool used to query a network interface and collect data by intercepting and logging network traffic

Packet Sniffer

200

Process of identifying an

individual

Authentication

200

limits access to resources based on the sensitivity of information and the users clearance level

MAC(Mandatory Access Control)

200

Question the obvious is in what

step of the troubleshooting

methodology

Establish a theory

200

This metric specifies the maximum acceptable amount of data loss measured in time

RPO(Recovery Point Objective)

200

A network protocol developed by Cisco for collecting and monitoring network traffic data

NetFlow

300

Process of granting or denying a

user access to network resources

Authorization

300

Type of access control that denies all access unless granted

Implicit Deny

300

A network of devices and software that manage and automate industrial processes, such as manufacturing.

ICS(Industrial Control System)

300

time in the future when you

expect to restore availability

after some type of failure

RTO(Recovery Time Objective)

300

a program that processes

capture files from packet sniffers

and analyzes them based on our

monitoring needs

Protocol Analyzer(WireShark)

400

Protocol developed by Cisco to support AAA in a network with many switches and routers

TACACS+

400

The framework associated with

requiring all hardware, software

and users to validate their trust

inside a network.

Zero Trust

400

Focuses on real-time data acquisitions and control. Monitors and controls equipment and conditions

SCADA(Supervisory Control and Data Acquisition)

400

how an organization will respond to a disruptive event and resume operations

DRP(Disaster Recovery Plan)

400

Tool used to perform port

scanning, identify versions of

network services in operation

and identify operating systems

NMAP, Zenmap

500

network authentication protocol that  allow nodes communicating over a non-secure network to prove their identity to one another on a basis of tickets?

Kerberos

500

Framework that manages access

to the network based on the role in the company

RBAC(Role Based Access Control)

500

A secure buffer zone between an organizations internal and external network

Perimeter Network, Screened Subnet

500

ensures critical business

functions to continue while

operations are disrupted

BCP(Business Continuity Plan)

500

A strategy and set of tools designed to prevent sensitive information from being lost, stolen, or accessed by unauthorized users

DLP(Data Loss Prevention)