Fundamentals of Security Flashcards
(60 cards)
What is Information Security?
The act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure and corruption, and destruction.
What is Information Systems Security?
The act of protecting the systems that hold and process the critical data.
What is the CIA Triad?
Confidentiality, Integrity, Availability
Define Confidentiality in the context of the CIA Triad
Confidentiality is ensuring that information is only accessible to those with the appropriate authorization.
Define Integrity in the context of the CIA Triad
Ensure that data remains accurate and unaltered unless modification is required.
Define Availability in the context of the CIA Triad
Ensure that information and resources are accessible and functional when needed by authorized users.
What is non-repudiation?
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.
What is AAA?
Authentication, Authorization, Accounting
What is authentication?
Authentication is the process of verifying the identity of a user or system.
What is authorization?
Authorization defines what actions or resources a user can access.
What is accounting in the context of cyber security?
Accounting is the act of tracking user activities and resource usage, typically for audit or billing purposes.
What are Security Controls?
Security Controls are measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity, and availability of information systems and data.
What is Zero Trust?
A security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.
What are the 4 Security Control Categories?
Technical, Managerial, Operational, Physical
What are the 6 types of Security Controls?
Preventative, Deterrent, Detective, Corrective, Compensating, Directive
What 2 planes do we use to achieve Zero Trust?
The Control plane and the Data plane
What is the Control Plane?
The control plane consists of the adaptive identity, threat scope reduction, policy-driven access control, and secured zones.
What is the Data Plane?
The data plane is focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points.
What is a Threat?
A threat is anything that could cause harm, loss, damage, or compromise to our information technology systems.
Where can Threats come from?
Natural disasters, cyber-attacks, data integrity breaches, disclosure of confidential information.
What is a Vulnerability?
A vulnerability is any weakness in the system design or implementation.
Where can Vulnerabilities come from?
Software bugs, misconfigured software, improperly protected network devices, missing security patches, lack of physical security
What is Risk Management?
Risk management is finding different ways to minimize the likelihood of an outcome and achieve the desired outcome
What are the 5 methods we use to ensure Confidentiality?
Encryption, Access Controls, Data Masking, Physical Security Measures, Training and Awareness.