Back

Data is transit - Data transmitted over a network

Most network devices are concerned with forwarding data, not security

To secure a network, we use:


Data at rest - Data on a storage device

To protect data at rest, data is often encrypted before being stored

In addition to encryption, permissions are also used in data storage


Public Key Infrastructure (PKI) - Manages digital certificates and keys for an organization

Digital Certificates - Given to users and devices, signed by a certificate authority

Certificate Authority - The centralized authority that signs certificates

Self-signed Certificates

IAM (Identity and Access Management)

Least Privilege - A user can access only the bare minimum that is needed for their job

RBAC (Role-Based Access Control) - An admin creates roles, such as "manager" or "shipping department", that have different levels of access then assigns these roles to users

Geographic Restrictions - Restriction based on location

Camera - CCTV (Closed Circuit TV)

Door Locks