Security/Network Basics (Ch. 1,2) Flashcards
(103 cards)
CIA triad
_ confidentiality
_ integrity
_ availability
User identification
_ Claiming an identity prior to authentication
Integrity
_ Ensures data has not changed.
_ Can uses hashes to verify integrity
Redundancy
_ Provides fault tolerance
SPOF
_ Single point of failure
_ If it fails, the entire system “can” fail
Scalability vs. elasticity
Scalability:
_ long-term strategy for being able to scale
_ done manually
Elasticity:
_ ability to dynamically scale up or out as needed
_ scales back down when not needed
TCO
_ total cost of ownership
resiliency
_ ability to self-heal or recover from faults with minimal downtime
_ e.g. performing and testing backups
_ e.g. UPS or generators
_ e.g. NIC teaming
_ e.g. redundant disk subsystems
_ e.g. retrying failed processes
Space needed for encryption
_ typically about a 40% increase
risk
_ the possibility or likelihood of a threat exploiting a vulnerability and resulting in a loss
threat
_ a circumstance or event that has the potential to compromise confidentiality, integrity, or availability
_ can be natural or man-made
_ can be intentional or accidental
Risk mitigation
_ reducing the chances that a threat will exploit a vulnerability
Categories of security controls
_ managerial controls
_ operational controls
_ technical controls
_ (classification alternative to “control types”)
Managerial controls
_ administrative controls
_ document policy
_ regular reviews, such as risk assessments and vulnerability assessments
Operational controls
_ ensure day-to-day ops comply with security plan
_ primarily implemented by people rather than systems
_ e.g. awareness and training
_ e.g. configuration management (such as secure baselines and change management)
_ e.g. media protection
_ e.g. physical and environmental protection
Technical controls
_ technological controls, whether software or hardware
Control types
_ preventative
_ detective
_ corrective
_ deterrent
_ compensating
_ physical
_ (classification alternative to “control categories”)
Preventative controls
_ hardening (making more secure than default config, using defense-in-depth)
_ training
_ security guards
_ change management (a change process helps catch configuration problems before they occur)
_ account disablement policy
_ intrusion prevention system (IPS)
_ and others (not listed)
SEM
_ security event management
_ real-time monitoring and analysis of security events
SIM
_ security information management
_ long-term storage of security data
_ used for analyzing trends and creating reports
SIEM
_ security information and event management system
_ collects, analyzes, manages data from multiple sources
_ detects trends
_ raises alerts
_ combines SEM and SIM functions
IDS
_ intrusion detection system
_ monitors network and sends alerts
_ out-of-band with traffic (can’t block traffic)
_ may modify ACLs, terminate processes, or redirect traffic in response to detections
Detective controls
_ post-exploit
_ log monitoring
_ SIEM systems
_ security audit of organization
_ video surveillance
_ motion dection
_ intrusion detection system (IDS)
_ and others (not listed)
Corrective and recovery controls
_ backups and system recovery
_ incident handling process