Fundamentals of Security Flashcards
(47 cards)
What is Information Security?
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.
What is Information Systems Security?
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data.
What does the CIA Triad stand for?
Confidentiality, Integrity, Availability.
What is Confidentiality?
Ensures information is accessible only to authorized personnel (e.g., encryption).
What is Integrity?
Ensures data remains accurate and unaltered (e.g., checksums).
What is Availability?
Ensures information and resources are accessible when needed (e.g., redundancy measures).
What is Non-Repudiation?
Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures).
What is the CIANA Pentagon?
An extension of the CIA triad with the addition of non-repudiation and authentication.
What are the Triple A’s of Security?
Authentication, Authorization, Accounting.
What is Authentication?
Verifying the identity of a user or system (e.g., password checks).
What is Authorization?
Determining actions or resources an authenticated user can access (e.g., permissions).
What is Accounting?
Tracking user activities and resource usage for audit or billing purposes.
What are the Security Control Categories?
Technical, Managerial, Operational, Physical.
What are the Security Control Types?
Preventative, Deterrent, Detective, Corrective, Compensating, Directive.
What is the Zero Trust Model?
Operates on the principle that no one should be trusted by default.
What is the Control Plane in Zero Trust?
Adaptive identity, threat scope reduction, policy-driven access control, and secured zones.
What is the Data Plane in Zero Trust?
Subject/system, policy engine, policy administrator, and establishing policy enforcement points.
What is a Threat?
Anything that could cause harm, loss, damage, or compromise to our information technology systems.
What is a Vulnerability?
Any weakness in the system design or implementation.
What is Risk Management?
Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome.
What is Confidentiality in security?
Refers to the protection of information from unauthorized access and disclosure.
Why is Confidentiality important?
To protect personal privacy, maintain a business advantage, and achieve regulatory compliance.
What are methods to ensure Confidentiality?
Encryption, Access Controls, Data Masking, Physical Security Measures, Training and Awareness.
What is Integrity in security?
Helps ensure that information and data remain accurate and unchanged from its original state.