Primary Definitions 1.0-8.0 Flashcards
Understanding all the core security concepts. (185 cards)
CIA Triad
Confidentiality, Integrity, Availability.
AAA of Security
Authentication, Authorization, Accounting.
Threat
Anything that could cause harm, loss, damage, or compromise to information technology systems.
Vulnerability
Any weakness in the system design or implementation.
Zero Trust
Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.
Confidentiality
Protection of information from unauthorized access or disclosure.
Encryption
Process of converting data into code to prevent unauthorized access.
Access Controls
Ensure only authorized personnel can access certain types of data.
Data Masking
Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users.
Integrity
Ensuring information and data remain accurate and unchanged from their original state unless intentionally modified by an authorized individual.
Hashing
Process of converting data into a fixed-size value.
Checksums
Method to verify the integrity of data during transmission.
Availability
Ensuring information, systems, and resources are accessible and operational when needed by authorized users.
Redundancy
Duplication of critical components or functions of a system with the intention of enhancing its reliability.
Non-Repudiation
Focused on providing undeniable proof in digital transactions.
Digital Signature
The process of hashing a message/communication and encrypting the hash with a private key so anyone with the public key can trace the ownership.
Authentication
Security measure that ensures individuals or entities are who they claim to be during a communication or transaction.
Multi-factor Authentication (MFA)
Using two or more methods of user verification together.
Authorization
Permission and privileges granted to users or entities after they have been authenticated that determine what they can do within a system.
Accounting
Security measure that ensures all user activities are properly tracked and recorded.
Secured Zones
Isolated environments within a network that are designed to house sensitive data.
Gap Analysis
Process of evaluating the differences between an organization’s current performance and it’s desired performance.
Plan of Action and Milestones (POA&M)
Outlines the specific measures to address each vulnerability, allocate resources, and set up timelines for each remediation task that is needed.
Threat Actor
An individual or entity responsible for incidents that impact security and data protection.