Fundamentals of Security Flashcards
Objectives 1.1 and 1.2 (104 cards)
Define / Explain
Information Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Define / Explain
Information Systems Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data
Define / Explain
Confidentiality
CIA Triad
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Ensures information is acessible only to authorized personnel (e.g., encryption)
CIA Triad - Confidentiality
Define / Explain
Integrity
CIA Triad
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Ensures data remains accurate and unaltered (e.g., checksums)
CIA Triad - Integrity
Define / Explain
Availability
CIA Triad
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Ensures information and resources are accessible when needed (e.g., redundancy measures)
CIA Triad - Availability
Define / Explain
CIANA Pentagon
CIA Triad + NA = CIANA Pentagon
Obj. 1.0 - General Security Concepts | Fundamentals of Security
An extension of the CIA triad with the addition of non-repudiation and authentication
CIANA Pentagon = Non-repudiation + Authentication
Define / Explain
Non-Repudiation
CIA Triad + NA = CIANA Pentagon
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)
CIANA Pentagon - Non-repudiation
Define / Explain
Authentication
AAA / Triple A’s of Security & CIANA Pentagon
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Verifying the identity of a user or system (e.g., password checks)
AAA / Triple A’s of Security & CIANA Pentagon - Authentication
Define / Explain
Authorization
AAA / Triple A’s of Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Determining actions or resources an authenticated user can access (e.g., permissions)
AAA / Triple A’s of Security
Define / Explain
Accounting
AAA / Triple A’s of Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Tracking user activities and resource usage for audit or billing purposes
AAA / Triple A’s of Security
List the following
Security Control Categories
Obj. 1.0 - General Security Concepts | Fundamentals of Security
- Technical
- Managerial
- Operational
- Physical
Security Control Categories (4)
List the following
Security Control Types
Obj. 1.0 - General Security Concepts | Fundamentals of Security
- Preventative
- Deterrent
- Detective
- Corrective
- Compensating
- Directive
Security Control Types (5)
Define / Explain
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Operates on the principle that no one should be trusted by default
Informational
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
To achieve zero trust, we use the control plane and the data plane
Informational
Define / Explain
Control Plane
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
Define / Explain
Data Plane
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Subject/system, policy engine, policy administrator, and establishing policy enforcement points
Define / Explain
Threat
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
Anything that could cause harm, loss, damage, or compromise to our information technology systems
Informational
Threats can come from the following…
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
- Natural disasters
- Cyber-attacks
- Data integrity breaches
- Disclosure of confidential information
Informational
Define / Explain
Vulnerability
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
Any weakness in the system design or implementation
Informational
Vulnerabilities can come from internal factors like the following…
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
- Software bugs
- Misconfigured software
- Improperly protected network devices
- Missing security patches
- Lack of physical security
Informational
Informational
Where threats and vulnerabilities intersect, that is where the risk to your enterprise systems and networks lies
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
- If you have a threat, but there is no matching vulnerability to it, t hen you have no risk
- The same holds true that if you have a vulnerability but there’s no threat against it, there would be no risk
Informational
Define / Explain
Risk Management
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome
Informational
Confidentiality…
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
- Refers to the protection of information from unauthorized access and disclosure
- Ensure that private or sensitive information is not available or disclosed to unauthorized individuals, entities, or processes
Informational
Informational
Confidentiality is important for three main reasons…
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
- To protect personal privacy
- To maintain a business advantage
- To achieve regulatory compliance
Informational