General Concept (Chapter 1) Flashcards
(72 cards)
CIA Triad
Confidentiality
- protects systems and data form unauthorized access
Integrity
- ensures data and systems have not been tampered with
Availability
- ensures that data and systems can still be access by authorised users and systems when needed
Security, Functionality, Usability
An interlocked systems where if security is increased both Usability and functionality decrease
Defense in depth
Are layers of security control that provides redundancy incase one layer has been breached
Vulnerability
Is a weakness/flaw in a system
Threat
Anything that can potentially take advantage of a vulnerability
Exploit
A mechanism that takes advantage of a vulnerability
Payload
Is the part of an exploit that damages the system/steals information
Zero-day attack
A new/unseen attack that the vendor has not seen
Control
A policy that is employed to help protect systems
Mitigation
An actions or control that helps reduce the impact of a negative attack
Non-repudiation
A security concept that prevents the denial of involvement or responsibility of an individual by applying a digital signature to all actions of a user
Principle of least privilege
A security concept that allows only the bare minimum access to the data that a user needs to perform their job
Accountability
Ensure that responsible parties are held liable for their actions
Authenticity
The proven fact that something is legitimate
Gap analysis
A thorough analysis of an organisations security defenses that identify security flaws
Authentication, Authorization, Accounting
An Architectural framework to provide, enforce and audit access to a network or data resources.
- Authentication request are forwarded to a central AAA server (RADIUS, TACACS) which checks users credentials against the directory service server
Zero Trust
A security strategy that assumes that all systems on the network (public & private) are compromised and each have to be authorised to access the rest of the network.
Three principles of zero Trust
1) Least Privilege
2) Access Privileges must be constantly reauthorized
3) Continuous monitoring
Honeypot
A decoy system intended to look legitimate to divert an attack so that information of the attacker can be gathered
Honeynet
A decoy networking containing 1 or multiple honeypots,
Honeyfile
A fake file located in a network file share or server
Honey token
Fake data deployed that legitimate users won’t need access to it, so that only an attacker would access it thus signalling an attack
Physical Control
Are tangible mechanisms designed to prevent unauthorized access to rooms, equipment, documents and other items
Administrative/Managerial control
Procedures and policies that inform people on how the business is to be run and how day to day operations are to be conducted