Fundamentals of Security Flashcards
(90 cards)
What is the act of protecting data & information from unauthorized access, unlawful modification and disruption, disclosure, corruption, & destruction?
Information Security
What is the act of protecting the systems that hold and process the critical data?
Information Systems Security
What does C.I.A stand for?
Confidentiality, Integrity, Availability
Confidentiality?
Ensures that information is only accessible to those with the appropriate authorization. Protection of information from unauthorized access & disclosure (Encryption).
Integrity?
Ensures that data remains accurate & unaltered from its original state unless modification is required by an authorized individual (Hashing).
Availability?
Ensures that information, systems, & resources are accessible & functional when needed by authorized users (Redundancy).
Non-repudiation?
Guaranteeing that a specific action or event has taken place & can’t be denied by the parties involved. Provides undeniable proof in digital transactions (Digital Signatures).
What are the Triple A’s of Security?
Authentication, Authorization, Accounting.
Authentication?
The process of verifying the identity of a user or system. Ensures individuals or entities who claim to be during a communication or transaction.
Authorization?
Defines what actions or resources a user can access. The permissions and privileges granted to users or entities after they have been authenticated (Rules & Policies).
Accounting?
The act of tracking user activities & resource usage, typically for audit or billing purposes. A security measure that ensures all user activities are properly tracked & recorded.
Security Controls?
Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity, and availability of information Systems and data.
Zero Trust?
A security model that operates on principle that no one, inside or outside the organization, should be trusted by default.
Control Plane?
Consists of the adaptive identity, threat scope reduction, policy-driven access control, and secured zones.
Data Plane?
Focuses on the subject/system, policy engine, policy administrator, and establishing policy enforcement points.
Threat?
Anything that could cause harm, loss, damage, or compromise to information technology systems.
Vulnerability?
Any weakness in the system design or implementation.
Risk Management?
Finding ways to minimize the likelihood of an outcome occurring & achieving the desired outcomes.
Why is Confidentiality important?
- Protect personal Privacy
- Maintain a business advantage
- Achieve regulatory compliance (PII, PHI, Financial Data)
What are 5 methods to maintain Confidentiality?
- Encryption
- Access Controls
- Data Masking
- Physical Security Measures
- Training & Awareness
Encryption?
The Process of converting data into code to prevent unauthorized access.
Access Controls?
Ensures only authorized personnel can access or modify certain types of data, reducing the risk of unintentional or malicious alterations.
Data Masking?
Obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users.
Physical Security Measures?
Ensures confidentiality for physical types of data and for digital information contained on servers and workstations.