Chapter 1 Flashcards
(38 cards)
CIA Triad
Confidentiality, integrity, availability
Confidentiality
Unauthorized individuals are not able to gain access to sensitive information
prevent using: fireballs, access control lists, and encryption
Integrity
No unauthorized modifications are made to information or systems
Prevent using: basing and integrity monitoring solutions
Availability
Information and systems are ready to meet the needs to legitimate users when they are requested
Prevent using: fault tolerance, clustering, and backups
Security incidents
Organizations experience a breach of the CIA triad of information or information systems
DAD Triad
Three key threats to cybersecurity efforts: disclosure, alteration, denial
Disclosure
Exposure if sensitive information to unauthorized individuals, violating confidentiality
Alteration
Unauthorized modification of information violating integrity
Denial
Unintended disruption of an authorized users legitimate access to information violating availability
Data exfiltration
Attacker gains access to sensitive information and removes It from the organization
Breach impact
Measured risk by: financial, reputations, strategic, operational, and compliance
Financial risk
Risk of monetary damage to the organization
Reputational risk
Negative publicity surrounding a breach causes loss of customers, employees, suppliers, and stakeholders
Strategic risk
Risk that an organization will become less effective in meeting major goals and objectives
Operational risk
Risk to the organizations ability to carry out day to day functions
Compliance risk
Security breach causes an organization to run afoul of legal or regulatory requirements
Security controls
Specific measures that fulfill the security objectives of an organization
Categories: technical, operational, managerial
Technical controls
Enforce CIA in the digital space
Examples: firewall rules, access control lists, intrusion prevention systems, encryption
Operational controls
The process to manage technology in a secure manner
Examples: user access reviews, log monitoring, and vulnerability management
Managerial controls
Procedures focused in the mechanics of the risk management process
Examples: risk assessment, security planning exercises, incorporation if security into change management/service acquisition/project management practices
Preventative controls
Stop a security issue before It occurs
Examples: firewalls, encryption
Detective controls
Identify security events that have already occurred
Example: intrusion detection systems
Corrective controls
Remediate security issues that have occurred
Example: restoring backups after an attack
Deterrent controls
Seek to prevent an attacker from attentions to violate security policies
Example: guard dogs, wired fence