J.Dion Sec. 2 Security Fundamentals Flashcards
Any weakness in the system design or implementaton.
Vulnerability
Why can vulnerabilities be controlled?
They are typically internal factors that are within the organizational control such as
software bugs
Misconfigured software
Improper protection for Network Devices
Missing security patches
Lack of physical security
What lies at the intersection of threats and vulnerabilities?
Risk to the enterprise systems and networks.
Threat + No Vulnerability =
No Risk
Vulnerability + No Threat =
No Risk
Finding different ways to minimize the likelihood of an outcome occurring and achieve the desires outcomes.
Risk management
Anything that could cause harm, loss, damage, or compromise to information technology systems.
Threat
Refers to the protection of information from unauthorized access and disclosure.
Confidentiality
Process of converting data into code to prevent unauthorized access.
Encryption
What are the 5 basic methods to ensure confidentiality?
Encryption
Access Controls
Data Masking
Physical Security Measures
Training and Awareness
Method that ensures only authorized personnel can access certain types of data?
Access controls
Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users.
Data masking
Method used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.
Physical security measures
Method of conducting regular training on the security awareness best practices that employees can use to protect the organization’s sensitive data.
Training and awareness
When we hear confidentiality think
Encryption
When we hear encryption think
confidentiality
Helps to ensure information and data remain accurate and unchanged from their original state unless intentionally modified by an authorized user.
Integrity
What does integrity verify?
The accuracy and trustworthiness of data over the entire lifecycle.
What three main reasons is integrity important?
Ensure data accuracy
Maintain trust
Ensure system operability
What five methods help maintain integrity of data?
Hash
Digital signatures
Checksums
Access Controls
Regular Audits
Method that converts data into a fixed-size value.
Hashing
What are the results of hashing function?
Hash digest
Serves as a digital fingerprint for any given piece of data to prove its integrity.
Hash digest
Method that uses encryptions to ensure integrity and authenticy.
Digital signatures