Lesson 10 Flashcards
(130 cards)
Name the CIA Triad
Confidentiality
Integrity
Availability
Confidentiality
Keeping information private and protecting it from unauthorized use
What are some things that maybe confidential
Trade Secrets
Personnel Records
Tax Records
Military Secrets
Integrity
Keeping information accurate, free from errors, and unauthorized modifications
Availability
Making sure that the resources are available for use by end users
How to ensure Integrity
Encryption
Hashing
How to ensure Availability
SANS
Redundancy
What are the four security factors that most systems rely on
Authorization
Access Control
Accountability
Auditing
Authorization
determining what rights and privileges an entity has
Access Control
assigning privileges to various resources, objects or data
Accountability
Who to hold responsible for a particular activity or even such as a logon
Auditing
process of tracking and recording system activities and resources
Non repudiation
goal of ensuring that data remains associated with the party that creates it or send a transmission with the data
Least Privilege
users or software have only the minimal level of access that is necessary for them to perform their duties
Privilege Bracketing
to allow privileges only when needed and then revoke them as soon as the user finishes the task or the need has passed
Risk
a concept that indicates exposure to the chance of damage or loss.
Likelihood of a hazard or threat occurring.
Risk is often associated with
The loss of power
Loss of a device
Loss of the network
Other physical loss
A disgruntled employee is a threat or vulnerability
Threat
What is the determining factor when looking at information system security
Risk
Unauthorized access
network of data access that is not explicitly approved by an organization
Name some acts of unauthorized access
Attack by an outsider
Misuse of privileges
Inadvertent actions
Does Unauthorized access result in data loss or damage
No
Can unauthorized access lead to network attacks
Yes
Data Breach
Sensitive or protected data is copied transmitted viewed stolen or used by individuals unauthorized to do so