Chapter 1 Flashcards
(73 cards)
CIA security Triad
Confidentiality, Integrity, Availability
Use Case
A goal that an organization wants to achieve
Confidentiality
prevents the unauthorized disclosure of data. In other words, authorized personnel can access the data, but unauthorized personnel cannot access the data.
Encryption
Encryption scrambles data to make it unreadable by unauthorized personnel. Authorized personnel can decrypt the data to access it,
a strong technical control used to protect the confidentiality of data.
(PII)
Personally Identifiable Information such as medical information or credit card data via email.
Access Controls
Identification, authentication, and authorization combined provide access controls and help ensure authorized personnel can access the data
Identification.
Users claim an identity with a unique username.
Authentication.
Users prove their identity with authentication, such as with a password.
Authorization.
grant or restrict access to resources using an authorization method, such as permissions.
Obfuscation
attempt to make something unclear or difficult to understand.
Integrity
provides assurances that data has not changed. This includes ensuring that no one has modified, tampered with, or corrupted the data.
Hashing
only tells you that the message has been modified.
verify that integrity is maintained when files are downloaded or transferred.
hash is simply a number created with a hashing algorithm.
Fault Tolerance
a system with fault tolerance can suffer a fault, but it can tolerate it and continue to operate.
single point of failure (SPOF).
its failure takes down the server.
Disk redundancies.
RAID-1 (mirroring), RAID-5 (striping with parity), and RAID-10 (striping with a mirror), allow a system to continue to operate even if a disk fails.
Server redundancies.
In a failover cluster, the service switches from the failed server in a cluster to an operational server in the same cluster.
Load balancing.
uses multiple servers to support a single service, such as a high-volume web site. It can increase the availability of web sites and web-based applications.
Site redundancies.
If a site can no longer function due to a disaster, the organization can move critical systems to an alternate site.
Backups.
personnel back up important data, they can restore it if the original data is lost.
Alternate power.
Uninterruptible power supplies (UPSs) and power generators can provide power to key systems even if commercial power fails.
Cooling systems.
Heating, ventilation, and air conditioning (HVAC) systems improve the availability of systems by reducing outages from overheating.
Patching
When software vendors discover the bugs, they develop and release code that patches or resolves these problems.
Risk
the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.
threat
is any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.