Fundamentals of Security Flashcards
(26 cards)
Fundamentals of Security
Information Security
Fundamentals of Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Fundamentals of Security
Information Systems Security
Fundamentals of Security
Protecting the systems (computers, servers, network devices) that hold and process critical data
Fundamentals of Security
Confidentiality
CIA Triad:
Fundamentals of Security
Ensures information is accessible only to authorized personnel (e.g., encrytpion)
Fundamentals of Security
Integrity
CIA Triad:
Fundamentals of Security
Ensures data remains accurate and unaltered (e.g., checksums)
Fundamentals of Security
Availability
CIA Triad:
Fundamentals of Security
Ensures information and resources are accessible when needed (e.g., redundancy measures)
Fundamentals of Security
Non-Repudiation
Fundamentals of Security
Guarantees that an action or even cannot be denired by the involved parties (e.g., digital signatures)
Fundamentals of Security
CIANA Pentagon
Fundamentals of Security
Extension of the CIA Triad with the addition non-repudiation and authentication
Fundamentals of Security
Authentication
AAA’s of Security:
Fundamentals of Security
Verifying the identity of a user or system (e.g., password checks)
Fundamentals of Security
Authorization
AAA’s of Security:
Fundamentals of Security
Determining actions or resources am authenticated user can access (e.g., permissions)
Fundamentals of Security
Accounting
AAA’s of Security:
Fundamentals of Security
Tracking user activities and resource usage for audit or billing purposes
Fundamentals of Security
Security Control Categories
Fundamentals of Security
- Technical
- Managerial
- Operational
- Physical
Fundamentals of Security
Security Control Types
Fundamentals of Security
- Preventative
- Deterrent
- Detective
- Corrective
- Compensating
- Directive
Fundamentals of Security
Zero Trust Model
Fundamentals of Security
Operates on the principle that no one should be trusted by default
Fundamentals of Security
Control Plane
Fundamentals of Security
Adaptive identity, threat scope reduction, policy driven access control, and secured zones
Fundamentals of Security
Data Plane
Fundamentals of Security
Subject/system, policy engine, policy administrator, and establishing policy enforcement points
Fundamentals of Security
Threat
Threats & Vulnerabilities
Anything that could cause harm, loss, damage, or compromise to our IT systems (External)
Can come from…
- Natural disasters
- Cyber-attacks
- Data integrity breaches
- Disclosure of confidential information
Fundamentals of Security
Vulnerability
Threats & Vulnerabilities
Any weakness IN the system design or implementation (Internal)
Can come from…
- Software bugs
- Misconfigured software
- Improperly protected network drives
- Missing security patches
- Lack of physical security
Fundamentals of Security
Risk Management
Threats & Vulnerabilities
Finiding different ways to minimize the likelihood of an outcome and achieve the desired outcome
Fundamentals of Security
Confidentiality
Confidentiality
- The protection of information from unauthorized access and disclosure
- Esure that private or sensitive information is not available or disclosed to unauthorized individuals, entities, or processes
Fundamentals of Security
Confidentiality is important for 3 reasons…
Confidentiality
- To protect personal privacy
- To maintain a business advantage
- To achieve regulatory compliance
Fundamentals of Security
To ensure confidentiality, five basic methods are used…
Confidentiality
- Encyrption
- Access Controls
- Data Masking
- Physical Security Measures
- Training and Awareness
Fundamentals of Security
Encryption
Five methods used to ensure confidentiality
Confidentiality
Process of converting data into a code to prevent unauthorized access
(Confidentiality = Encryption) !!
Fundamentals of Security
Access Controls
Five methods used to ensure confidentiality
Confidentiality
By setting up strong user permissions, you can ensure that only authorized personnel can access certain types of data
(e.g., Username and Password)
Fundamentals of Security
Physical Security Measures
Five methods used to ensure confidentiality
Confidentiality
Ensures confidentiality for both physical and digital types of data
(Locks on rooms containing servers/locking file cabinets)