Objective 1.2 Flashcards
Summarize fundamentals security concepts
CIA Triad
C - Confidentiality
I - Integrity
A - Availability
Ensures that information is only accessible to those with the appropriate authorization. (Ex: encryption)
Confidentiality
\\\\\\\\\\\\\\\\\\
Ensures the data remains accurate and unaltered unless modification is required. (Ex: checksums, hashing)
Integrity
Ensures that information resources are accessible and functional when needed by authorized users. (ex: website up and running all the time regardless the traffic it’s receiving.)
Availability
2 new elements to CIA triad making it a pentagon
N - Non-repudiation
A - Authentication
CIANA
Guaranteeing that specific action or event has taken place and cannot be denied by the parties involved. (Ex: A digitally signed email. That’s going to ensure that I cannot deny sending you that particular message because my digital signature is attached to it)
Non-repudiation
Process of verifying the identity of a user or system.
Authentication
AAA
Authentication
Authorization
Accounting
Process of verifying the identity of a user or system.
Authentication
Defines what actions or resources a user can access.
Authorization
Act of tracking user activities and resources usage, typically for audit or billing purpose.
Accounting
Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity, and availability of information systems and data.
Security Controls
Security Controls Categories
Technical
Managerial
Operational
Physical
Types of Security Controls
Preventative
Deterrent
Detective
Corrective
Compensating
Directive
Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.
Zero Trust
ZeroTrust: ???
Consists of adaptative identity, threat scope reduction, policy-driven access control, and secured zones.
.ZeroTrust: Control Plane
ZeroTrust: ???
Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points.
ZeroTrust: Data Plane
Confidentiality importance
- Protect personal privacy
- Maintaint a business advantage
- Achieve a regulatory compliance
5 methods to achieve CONFIDENTIALITY
- Encryption
- Access Control
- Data Masking
- Physical Secutiry Measures
- Training and Awareness
Ensure only authorized personnel can access certain types of data
Access Controls
Process of converting data into code to prevent unathorized access
Encryption
Method that involves obscuring data within a database to make it inacessible for unauthorized users while retaining the real data’s authencity and use for authorized users.
Data Masking
Used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.
Physical Security Measures
Conduct regular training on the security awareness best practices that employees can use to protect the organization’s sesitive data.
Training and Awareness