Fundamentals of Security Flashcards
Section 2 (95 cards)
Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure and corruption and destruction.
Information Security
The data that systems hold, not the data systems themselves is an example of what?
Information Security
Act of protecting the systems that hold and process the critical data.
Information Systems Security
The actual data systems (cell phones, computers, servers) not the actual data they hold are an example of what?
Information Systems Security
What is the CIA Triad also known as the 3 pillars of security
Confidentiality
Integrity
Availability
Ensures that information is only accessible to those with appropriate authorization.
Confidentiality
What Pillar of security is this an example of. Encrypting sensitive files and authorizing specific people to de-encrypt them and read them.
Confidentiality
Ensures that data remains accurate and unaltered unless modification is required.
Integrity
What Pillar of security is this an example of. Checksums can be used to verify that a file has not been changed or corrupted as it moves along a network during a data transfer
Integrity
Ensures that information and resources are accessible and functional when needed by authorized users.
Availability
What Pillar of security is this an example of. When you implement redundancy measures for a website to ensure it remains online and up at any time regardless of how much traffic it is receiving.
Availability
What is the CIANA Pentagon
Confidentiality
Integrity
Availability
Non-Repudiation
Authentication
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.
Non-Repudiation
Sending an email that has been digitally signed that a person cannot deny sending the email is an example of what
Non-Repudiation
What are the AAA of Security
Authentication
Authorization
Accounting
Process of verifying the identity of a user or system
Authentication
Defines what actions or resources a user can access
Authorization
Act of tracking user activities and resource usage, typically for auditing or billing purposes
Accounting
This is an example of what AAA of security. When you try to login to get our email username and password is being checked against a stored version to confirm your identity.
Authentication
This is an example of what AAA of security. In a company database you as an employee you may have access to view records but you many not have access to edit them so you have read permission
Authorization
This is an example of what AAA of security. When you log into your computer what you do is being logged to be able to monitor unusual or unauthorized behavior.
Accounting
Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity and availability of information systems and data
Security Controls
What are Security Control Categories
Technical
Managerial
Operational
Physical
What are Security Control Types
Preventative
Deterrent
Detective
Corrective
Compensation
Directive