1.2 Fundamental Security Concepts. Flashcards

(17 cards)

1
Q

What is the CIA Triad?

A

the fundamental objective of security professionals, ensuring: Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Ensures that data is only viewable by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Ensures there is no unauthorized modifications to information or systems, either intentionally or unintentionally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availabilty

A

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non-repudiation

A

ensures that an individual cannot deny performing an action, such as sending an email or making a transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AAA Security Model (Access Control Framework): (AAA Framework)

A

Used to manage and enforce security policies for users and systems accessing networks and resources. Works with identification for comprehensive access management.

Authentication → Verifies identity
Authorization → Grants Access
Accounting → Tracks & logs user activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Gap analysis

A

the process of comparing the current security state with the desired security state to identify deficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero Trust
- Control Plane
o Adaptive identity
o Threat scope reduction
o Policy-driven access control o Policy Administrator
o Policy Engine

A

Zero Trust means “Never trust, always verify.” It ensures that no one (inside or outside the network) is automatically trusted.

🔹 Control Plane (The Brain)
(this is where decisions are made, its the rules and policies that determine who accesses what)

1️⃣ Adaptive Identity – Constantly checks user/device identity based on behavior, location, and risk.
2️⃣ Threat Scope Reduction – Limits what an attacker can access if they break in (least privilege).
3️⃣ Policy-Driven Access Control – Rules decide who/what can access resources (e.g., only approved devices can log in).
4️⃣ Policy Administrator – Applies the access rules in real time.
5️⃣ Policy Engine – Decides if access is granted based on security policies and risk factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Zero Trust?

A

Zero Trust means “Never trust, always verify.” It ensures that no one (inside or outside the network) is automatically trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2️⃣ Threat Scope Reduction

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Threat Scope Reduction in zero trust?

A

Limits what an attacker can access if they break in (least privilege).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the control plane in zero trust?

A

🔹 Control Plane (The Brain)
(this is where decisions are made, its the rules and policies that determine who accesses what)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Adaptive Identity in Zero Trust?

A

Constantly checks user/device identity based on behavior, location and risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero Trust
- Data Plane
o Implicit trust zones
o Subject/System
o Policy Enforcement Point

A

The Data Plane (The Enforcer)
Enforces decisions made by the Control Plane. where security is implemented and data flows through

1️⃣ Implicit Trust Zones – Areas within the network that are usually trusted by default but still checked.
2️⃣ Subject/System – Refers to users (subjects) and systems (devices or applications) that want to access resources. Both need to be verified.
3️⃣ Policy Enforcement Point (PEP) – The point where the access control policies are enforced (e.g., firewalls, gateways). (gatekeeper)

This layer enforces the “never trust” approach by constantly checking and validating access requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are physical security measures and their components?

A

Physical security protects the physical assets of a facility from unauthorized access or harm. Key components include:

1️⃣ Bollards –Barriers used to prevent vehicle access to restricted areas.
2️⃣ Access Control Vestibule – Double-door system where one door must close before the other opens, controlling access to secure areas.
3️⃣ Fencing – Perimeter protection to restrict unauthorized entry.
4️⃣ Video Surveillance – Cameras that monitor and record activities for security purposes.
5️⃣ Security Guard – Personnel who patrol and ensure security of a facility.
6️⃣ Access Badge – Identification cards or badges used to grant access to authorized individuals.
7️⃣ Lighting – Well-lit areas to deter criminals and ensure visibility.

These measures work together to create a layered approach to physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Sensors
    o Infrared
    o Pressure
    o Microwave
    o Ultrasonic
A

8️⃣ Infrared Sensors – Detect heat signatures (e.g., body heat) to detect movement.
9️⃣ Pressure Sensors – Detect pressure changes (e.g., footsteps, vehicle movement) in a monitored area.
🔟 Microwave Sensors – Emit microwave signals and detect movement by changes in reflected signals.
1️⃣1️⃣ Ultrasonic Sensors – Emit ultrasonic waves and measure reflected sound to detect movement.

These components together strengthen a facility’s security.

17
Q

Deception and disruption technology
- Honeypot
- Honeynet
- Honeyfile
- Honeytoken

A

Deception and disruption technologies use fake resources to detect, mislead, or disrupt attackers.

Key components include:

1️⃣ Honeypot – A fake system designed to lure attackers, allowing monitoring and learning about attack methods.
2️⃣ Honeynet – A network of honeypots set up to simulate a real network environment and attract more sophisticated attacks.
3️⃣ Honeyfile – Fake files placed on a system or network that trigger alerts when accessed, indicating an intrusion.
4️⃣ Honeytoken – Fake data (like a decoy password or database entry) used to detect unauthorized access or malicious activity.

These tools help detect, analyze, and thwart attackers by providing decoy resources that make it harder for attackers to find real vulnerabilities.