Fundamentals of Security Flashcards
(34 cards)
What is Information Security?
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.
What is Information Systems Security?
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data.
What does the CIA Triad stand for?
- Confidentiality
- Integrity
- Availability
Define Confidentiality in the CIA Triad.
Ensures information is accessible only to authorized personnel (e.g., encryption).
Define Integrity in the CIA Triad.
Ensures data remains accurate and unaltered (e.g., checksums).
Define Availability in the CIA Triad.
Ensures information and resources are accessible when needed (e.g., redundancy measures).
What is Non-Repudiation?
Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures).
What is the CIANA Pentagon?
An extension of the CIA triad with the addition of non-repudiation and authentication.
What are the Triple A’s of Security?
- Authentication
- Authorization
- Accounting
What is Authentication?
Verifying the identity of a user or system (e.g., password checks).
What is Authorization?
Determining actions or resources an authenticated user can access (e.g., permissions).
What is Accounting in security?
Tracking user activities and resource usage for audit or billing purposes.
List the Security Control Categories.
- Technical
- Managerial
- Operational
- Physical
List the types of Security Controls.
- Preventative
- Deterrent
- Detective
- Corrective
- Compensating
- Directive
What is the Zero Trust Model?
Operates on the principle that no one should be trusted by default.
What are the two planes used in Zero Trust?
- Control Plane
- Data Plane
Define Threat in the context of cybersecurity.
Anything that could cause harm, loss, damage, or compromise to our information technology systems.
What can be considered as sources of threats?
- Natural disasters
- Cyber-attacks
- Data integrity breaches
- Disclosure of confidential information
Define Vulnerability.
Any weakness in the system design or implementation.
What are internal factors contributing to vulnerabilities?
- Software bugs
- Misconfigured software
- Improperly protected network devices
- Missing security patches
- Lack of physical security
What is Risk Management?
Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome.
What are the five basic methods to ensure Confidentiality?
- Encryption
- Access Controls
- Data Masking
- Physical Security Measures
- Training and Awareness
What is Hashing?
Process of converting data into a fixed-size value.
What is the importance of Integrity?
- To ensure data accuracy
- To maintain trust
- To ensure system operability