Fundamentals Flashcards
Security Concern Areas
Internal Users
Ease of use and Security
Convenience and Usability
Information Security (Data)
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.
Information Systems Security
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data.
CIA Triad
Confidentiality, Integrity, Availibility
CIANA Pentagon
CIA plus Non-repudiation, Authentication
Confidentiality (CIA Triad)
Ensures information is accessible only to authorized personnel (e.g., encryption)
Integrity (CIA Triad)
Ensures data remains accurate and unaltered (e.g., checksums)
Availibility (CIA Triad)
Ensures information and resources are accessible when needed (e.g., redundancy measures)
Triple A’s of Security
Authentication / Authorization / Accounting
Authentication (Triple A)
Verifying the identity of a user or system (e.g., password checks)
Authorization (Triple A)
Determining actions or resources an authenticated user can access (e.g., permissions)
Accounting (Triple A)
Tracking user activities and resource usage for audit or billing purposes
Security Control Categories
Technical / Managerial / Operational / Physical
Security Control Types
Preventive / Deterrent / Detective / Corrective / Compensating / Directive
Zero Trust Model
Operates on the principle that no one should be trusted by default.
To achieve Zero Trust we use Control Plane and Data Plane.