security

SSH

November 11, 2020
security, utilities, linux, networking

Secure Shell (SSH) # Allows a terminal or client to connect to a host terminal with data encrypted as it traverses the network. Protocol: TCP Port: 22 Replaced telnet SSH servers use public-key cryptography and challenge-response authentication . Process: # Server sends public key to client After the client receives the key, it creates a session ID and encrypts it with the public key. The server decrypts the session ID and uses it in all data transfers going forward. ...

20220319104905-defense-in-depth

networking, security

Defense in Depth # A network security strategy based on implementing multiple security layers to provide a more robust defense. 4 Common Components # Network Access Control (NAC) Network Segmentation Separation of Duties Honeypot

20220319110956-separation-of-duties

security

Separation of Duties # Separation of duties is the division of processes or transactions between two or more people to avoid the opportunity for someone to act wrongfully, create errors, abuse privileges, or perform theft or fraud.

20220319111229-honeypot

security

Honeypot # A honeypot in network security is a baited trap for attackers. It uses a computer system that is made to look like an organization’s legitimate system, including data and applications.

20220319111746-zero-trust

security

Zero Trust # Zero Trust is a security strategy based on the concept that no user or device should be allowed access to the network’s sensitive data without proper authentication and authorization within the network.

20220321163659-root-pw-rotation

security

Root Password Rotation # Resources # Rather than set static root passwords, do we really have to do this? Why not keep them unknown and just use the privileged user accounts that AWS, GCP and Azure setup? https://www.redhat.com/en/blog/what-about-root-passwords