Fundamentals of Security Flashcards
(61 cards)
Ensures information and resources are accessible when needed. (e.g., redundancy measures)
Availability
Ensures data remains accurate and unaltered. (e.g., checksums)
Integrity
Ensures information is accessible only to authorized personnel. (e.g., encryption)
Confidentiality
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data.
Information Systems Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.
Information Security
Guarantees that an action or event cannot be denied by the involved parties
Example: digital signatures
Non-Repudiation
An extension of the CIA triad with the addition of non-repudiation and authentication.
CIANA Pentagon
Authentication, Authorization, Accounting.
Triple A’s
Verifying the identity of a user or system (e.g., password checks).
Authentication
Determining actions or resources an authenticated user can access (e.g., permissions).
Authorization
Tracking user activities and resource usage for audit or billing purposes.
Accounting
Technical, Managerial, Operational, Physical.
Security Control Categories
Preventative, Deterrent, Detective, Corrective, Compensating, Directive.
Security Control Types
Operates on the principle that no one should be trusted by default.
Zero Trust Model
Adaptive identity, threat scope reduction, policy-driven access control, and secured zones.
Control Plane
Subject/system, policy engine, policy administrator, and establishing policy enforcement points.
Data Plane
Anything that could cause harm, loss, damage, or compromise to our information technology systems.
information technology systems
What are some sources of threats?
Natural disasters, cyber-attacks, data integrity breaches, and disclosure of confidential information.
What is a vulnerability in a system?
Any weakness in the system design or implementation.
What are some internal factors that can cause vulnerabilities?
Software bugs
Misconfigured software
Improperly protected network devices
Missing security patches
Lack of physical security.
Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome.
Risk Management
What does Confidentiality refer to?
The protection of information from unauthorized access and disclosure.
Why is Confidentiality important?
It is important to protect personal privacy, maintain a business advantage, and achieve regulatory compliance.
What are the five basic methods to ensure confidentiality?
- Encryption
- Access Controls
- Data Masking
- Physical Security Measures
- Training and Awareness