Ch 1. Mastering the Basics Flashcards
Presents the basics for understanding security. (36 cards)
Use Case
used to identify and clarify requirements to achieve a goal
Confidentiality
prevent the unauthorized disclosure of data
Encryption
scrambles data to make it unreadable by unauthorized personnel
What are the three elements of Access Controls?
Identification, Authentication, Authorization
Steganography
practice of hiding data within data
What are the three methods of Confidentiality?
Encryption, Access Controls, Steganography
Integrity
provides assurances that data has not changed
Hash
a number created by a executing a hashing algorithm against data
Digital Signature
use certificates and a Public Key Infrastructure to verify integrity and provide authentication and N-R
What are the two methods of Integrity?
Hashing and Digital Signatures
Availability
indicates that data and services are available when needed
Redundancy
adds duplication to critical systems and provides fault tolerance
Patch
code that resolves software bugs
What are the two methods of Availability?
Redundancy and Patching
Risk
the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss
Threat
any circumstance or event that has the potential to compromise confidentiality, integrity, or availability
Vulnerability
a weakness
Security Incident
an adverse event that can negatively affect the confidentiality, integrity, or availability of an org’s IT and data
Risk Mitigation
reducing risk through the implementation of controls, countermeasures, or safeguards
Types of Control Implementation
Technical, Administrative, Physical
Types of Control Goals
Preventative, Detective, Deterrent, Corrective, Compensating
Hypervisor
the software that creates, manages, and runs the VM
NIST
National Institute of Standards and Technology; publishes SPs in the 800 series
Type I Hypervisor
run directly on the system hardware