security

20220419115151-openssl

security

OpenSSL # Generate a Self-Signed Certificate # openssl req \ -newkey rsa:2048 -nodes -keyout domain.key \ -x509 -days 365 -out domain.crt Source: https://www.digitalocean.com/community/tutorials/openssl-essentials-working-with-ssl-certificates-private-keys-and-csrs See also # https://wiki.archlinux.org/title/OpenSSL https://www.openssl.org/

Access Control

networking, security

Access Control # Access control describes the mechanisms used to filter network traffic to determine who is and who is not allowed to access the network and network resources. Access Control Lists # Access-control list Mandatory Access Control # 20220315174137-mandatory-access-control Discretionary Access Control # Sources # Wikipedia - Access control

Authentication Authorization and Accounting (AAA)

security, networking

Authentication Authorization and Accounting # (AAA) Solves many of the issues with PPP . Is designed for the idea of port authentication. Allowing remote users authentication to a particular point of entry (a port) to another network. Authentication : authenticate with any type of authentication method, usually username and password. Authorization : once authenticated determine what it has access to. ...

Data Loss Prevention

networking, security

Data loss prevention (DLP) software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in motion (network traffic), and at rest (data storage). Source: https://en.wikipedia.org/wiki/Data_loss_prevention_software

DNS Cache Poisoning

networking, security

DNS cache poisoning is when an attacker targets a DNS server to query a malicious DNS server. The Malicious server can then tell the target DNS server spoofed DNS information and the DNS server will cache that spoofed information. The solution is to use Domain Name System Security Extensions (DNSSEC) for domain name resolution. cite: CompTIA Network+

Encryption

security, networking

Scramble, mix up, or change data so that it can’t be read. Cipher General term for a way to encrypt data Algorithm Mathematical formula that underlies the cipher Substitution XOR Ciphertext The result of running cleartext through a cipher algorithm using a key Symmetric-Key Encryption