Here in this article i am including the important terminology we need to know if we are working as a system engineer ,network engineer,system administrator whether Linux or Windows admin didn't matter.Here i will provide you the complete list of terms we need to know in networking or system admin field.Here in this tutorial i have discussed about various topics like pap,chap,asynchronous,,Tokens,throughput,RADIUS SERVER,TACACS,AAA,Data owner,subject,object,baseline,policies,procedures,standard,guideline,ARO,SLE etc
If we consider the topi regarding IT sector then Risk consists of these two important thing Threat and Vulnerability.where there is no Threat there is no risk.If there is Vulnerability in your system or Network and there is also threat of attack then risk is multiple effect of vulnerability.
This is an important terminology and every IT company have almost a separate department to handle ALE.
If you have a little knowledge off commerce field you can easily understand what asset value is.In short you understand it is a type of business valuation.
Total Cost of Ownership combining upfront costs and annual costs of maintenance
Policies are high-level management directives that don't go into specifics.
Procedures are step-by-step guides for accomplishing a task
says minimum amount required to do.
privileges are defined in every level whether it os operating system based or networking based.
operating system have several users created on privilege based. Administrator user have highest privilege than other and Guest user have least privileges than others.In Linux root have highest privilege.
In network deices like Routers and switches also have different privilege levels.
Need to know is more granular
Discretionary mean full control of objects they have access to
mandatory means system-enforced based on labels
role based, non-discretionary
Task-based = another non-discretionary method
Uses UDP 1812 and 1813. AAA system.
RADIUS request and response data is carried in
8-bit AVPs (Attritbute Value Pairs)
Tacacs is used for authentication and autheriation.
It is a centralized access control system that uses UDP port 49 and may use TCP
Objects have labels, and you have to have clearance to see them.
As we all know it is the most important point for any company institute or organiation and that is throughput. It is actually the biometric system response time.
Risk = Threat * Vulnerability
If we consider the topi regarding IT sector then Risk consists of these two important thing Threat and Vulnerability.where there is no Threat there is no risk.If there is Vulnerability in your system or Network and there is also threat of attack then risk is multiple effect of vulnerability.
ALE = Annualized Loss Expectancy
This is an important terminology and every IT company have almost a separate department to handle ALE.
AV = Asset Value
If you have a little knowledge off commerce field you can easily understand what asset value is.In short you understand it is a type of business valuation.
EF
EF means Exposure Factor - % of value lost
SLE
SLE stand for Single Loss Expectancy, the cost of a single loss.
ARO
ARO stands for Annual Rate of Occurrence (number of losses)
TCO
Total Cost of Ownership combining upfront costs and annual costs of maintenancePOLICIES:
Policies are high-level management directives that don't go into specifics.
PROCEDURES:
Procedures are step-by-step guides for accomplishing a task
Standard:
describes specific use of technologyGuideline:
recommendations (discretionary)Baseline:
uniform ways of implementing a safeguardData Owner
management employee responsible for ensuring protection of specific dataAAA
Authentication, Authorization, and Accountability
Least privilege
says minimum amount required to do.privileges are defined in every level whether it os operating system based or networking based.
operating system have several users created on privilege based. Administrator user have highest privilege than other and Guest user have least privileges than others.In Linux root have highest privilege.
In network deices like Routers and switches also have different privilege levels.
Need to know is more granular
Subject
active entity on a data systemObject
As we are here talking about computer and network system.In IT Sector or in computer field or networking department by saying OBJECT we mean passive data within the system.
Discretionary
Discretionary mean full control of objects they have access to
Mandatory
mandatory means system-enforced based on labels
RBAC
role based, non-discretionaryTask-based = another non-discretionary method
RADIUS
Uses UDP 1812 and 1813. AAA system.RADIUS request and response data is carried in
8-bit AVPs (Attritbute Value Pairs)
Diameter
RADIUS' successor with more accountability and a 32-bit AVP field.
TACACS
Tacacs is used for authentication and autheriation.It is a centralized access control system that uses UDP port 49 and may use TCP
PAP and CHAP
PAP stands for password authentication protocol and CHAP stands for challenged handshake authentication protocol.both used PPP connection.
PAP is plaintext so not so secure, while CHAP uses three way handshake. so chap is better than pap.You can READ:PAP Configuration Tutorial on cisco Router.
You can READ: CHAP Configuration on Cisco router.
Objects have labels, and you have to have clearance to see them.
Thanks for publishing such great information. You are doing such a great job. This information is very helpful for everyone. Keep sharing about it support Houston. Thanks.
ReplyDelete