Modules 1 + 2 Term -> Def Flashcards
CIA Triad
A model for guiding security policies in an organization.
Confidentiality
Ensuring that data is only accessible to authorized individuals.
Integrity
Maintaining accuracy and consistency of data over its lifecycle.
Availability
Ensuring that authorized users have reliable access to data and services.
AAA
Authentication, Authorization, and Accounting framework.
Identification
Claiming an identity in a system.
Authentication
Proving identity using credentials.
Authorization
Granting access to resources based on identity.
Accounting
Tracking actions and accesses in a system.
3 States of Data
Three conditionsff under which data exists. : at rest, in transit, in use
In Transit
Data that is being transmitted across networks.
At Rest
Data stored in a persistent storage medium.
In Use
Data actively used by a process.
Non-Repudiation
Ensuring that a sender cannot deny having sent a message.
Gap Analysis
Comparison of security measures against requirements.
Vulnerability
A weakness in a system or process.
Threat
A vulnerability with a threat actor.
Risk
The probability and impact of a threat.
Data Sovereignty
Compliance with local data storage regulations. the country of the user about whom the data is stored governs that data.
Security Controls
Methods for managing security risks.
Categories of Security (STOMP)
Security control classifications.
Security is:
Technical
Operational
Managerial
Physical
Deterrent
Discouraging unauthorized actions.
Preventative
Preventing security incidents.
(eg lock on product case)
Detective
Detecting security breaches.