701 Flashcards
Secuirty (141 cards)
Term
Definition
Domain 1: General Security Concepts
Security Controls
Technical: Security controls implemented through technology (e.g.
firewalls
Physical: Physical barriers and controls to protect resources (e.g.
locks
Deterrent: Controls that discourage violations (e.g.
warning signs).
Compensating: Alternative controls that compensate for weaknesses (e.g.
increased monitoring).
CIA Triad:
Confidentiality: Ensuring that information is accessible only to those authorized.
Availability: Ensuring that information is accessible when needed.
Non-repudiation: Ensuring that a party cannot deny the authenticity of their signature or actions.
Authentication: Verifying the identity of a user or system.
Authorization: Granting permissions to authenticated users or systems.
Authenticating people/systems: Methods used to verify identities (e.g.
passwords
Control Plane: Manages the flow of data to enforce policies.
Data Plane: Carries the actual data or application traffic.
Bollards: Physical barriers to prevent vehicle access.
Access control vestibule: Small
Video surveillance: Monitoring using cameras.
Security guard: Human security personnel.
Lighting: Use of light to deter or detect unauthorized access.
Sensors: Devices to detect movement
Honeypot: Decoy systems to attract attackers.
Honeynet: Network of honeypots.
Honeytoken: Decoy data used to detect unauthorized access.
Cryptographic Solutions
Public key: Key used to encrypt data
known to everyone.
Encryption: Converting data into a coded form.
Full-disk: Encrypting all data on a disk.
File: Encrypting individual files.
Volume: Encrypting a specific volume.
Record: Encrypting individual records.
Transport/communication: Encrypting data in transit.
Symmetric: Encryption using a single key for both encryption and decryption.
Key exchange: Method of securely exchanging encryption keys.
Key length: Length of the encryption key.
Tools:
HSM (Hardware Security Module): Device for managing cryptographic keys.
Key management system: Software for managing encryption keys.
Obfuscation:
Steganography: Hiding data within other data.