Kerberos Authentication

Wi-Fi

OSI Model

Layer 5

Layer 2

Layer 1

Virtual Machines

Intrusion Detection

Layer 4

Remote Access

Auth Methods

Layer 3

Layer 6

Layer 7

Security+

Encryption

o Logs allows an administrator to tune firewall rulesets, remove or block suspect hosts and processes from the network, or deploy additional security controls to mitigate any identified threats

Network-Based Intrusion Detection System (NIDS):

Hypervisors manage the virtual machine environment and facilitate interaction with the computer hardware and network. The computer component is the platform that hosts the virtual environment. Multiple computers may also be networked together.

Physical Layer

Deals with electrical impulses or optical pulses, sent as bits to convey data.

Data Link Layer

MAC addresses

ARP / RARP

Frame

Authentication Service = Responsible for authenticating user logon requests.

KDC = Component of Kerberos that authenticates users and issues tickets (tokens).

Clients request services from application servers, which both rely on an intermediary - a Key Distribution Center (KDC) - to vouch for their identity.

Network Layer

Authentication Header (AH)

o Provides confidentiality and/or authentication and integrity

Transport Layer

TLS, SSL TCP, UDP

Datagram / Segment

WPA2: o AES-128 - Replaces RC4 o CCMP (Cipher Block Chaining Message Authentication Code Protocol) - Replaces TKIP o Designed to make replay attacks harder

Session Layer

The process of removing a header (and possibly a footer) from the data received from a previous layer in the OSI model is known as de-encapsulation.

NFS, SQL, RPC

Data stream

TCP/IP Model Application layer: Application, Presentation, and Session

Presentation Layer

JPEG, ASCII, MIDI

Data stream

Data stream

Application Layer

Symmetric Ciphers: Assures confidentiality, well-suited to bulk encrypting large amounts of data.

With session affinity, when a client establishes a session, it remains with the node that first accepted its request, while an application-layer load balancer uses persistence to keep a client connected by setting up a cookie.

o Will NOT block the traffic during an attack

o Training and tuning are complex, which results in high false positive and false negative rates, especially during initial deployment

o Can identify and log hosts and applications and detect attack signatures and other indicators of attack

Hypervisors are the Virtual Machine Monitor (VMM) and guest operating systems are the Virtual Machines (VM) found within the virtual platform.

o The other core protocol of IPsec

o One of the two core protocols of IPsec

Encapsulation Security Payload (ESP)

ESP

WPA3 Personal Authentication o Also referred to as Password Authenticated Key Exchange (PAKE)

WPA2 PSK = Pre-Shared Key Authentication o Uses a passphrase to generate the key that is used to encrypt communications o Also referred to as group authentication because a group of users share the same secret

TKIP = Temporal Key Integrity Protocol A mechanism used in WPA 1 to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

HTTP, FTP, SMTP, SNMP

The notes I took that helped me pass the CompTIA Security+ exam.