Security Plus - Chapter 1 Flashcards
Confidentiality
Ensures that unauthorized individuals are not able to gain access to sensitive information.
Integrity
Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.
Availability
Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.
Confidentiality Controls
Firewalls
Access Control Lists
Encryption
Integrity Controls
Hashing
Integrity Monitoring Solution
Power surge protection
Availability Controls
Fault tolerance
Clustering
Backups
Nonrepudiation
A person that performed an action cannot later deny having taken that action. Digital signatures ensure nonrepudiation.
CIA Triad
Confidentiality, Integrity, Availability
DAD Triad
Disclosure, Alteration, Denial
Disclosure
The exposure of sensitive information to unauthorized individuals. Also known as data loss and a violation of the principle of Confidentiality.
Alteration
The unauthorized modification of sensitive information and is a violation of the principle of integrity.
Denial
The disruption of an authorized user’s legitimate access to information. This is a violation of the principle of Availability.
Types of breach impact risks
Financial
Reputational
Strategic
Operational
Compliance
Financial Risk
The risk of monetary damage to the organization as the result of a data breach.
Reputational Risk
Negative publicity surrounding a security breach that causes loss of goodwill among customers, employees, suppliers, and other stakeholders.
Strategic Risk
The risk an organization will become less effective in meeting its major goals and objectives as a result of a security breach.
Operational Risk
The risk to the organizations ability to carry out its day-to-day functions as the result of a security breach.
Compliance Risk
When a security breach causes an organization to run afoul of legal or regulatory requirements.
Control Objectives
Statements of a desired security state that the organization wishes to achieve.
Security Controls
Specific measures that fulfill the security objectives of an organization.
Gap Analysis
The Cybersecurity team reviews the control objectives for a particular organization, system, or service and then examines the controls designed to achieve those objectives. Any controls that do not meet the objectives are identified, and are considered potential risks that should be remediated as time and resources permit.
Technical Controls
A security control category that enforces confidentiality, integrity, and availability in the digital space.
Firewall rules
Access Control lists
Intrusion prevention systems
Encryption
Operational Controls
A security control category in which processes are established to manage technology in a secure manner.
User access reviews
Log monitoring
Vulnerability management
Managerial Controls
A security control category where procedural mechanisms that focus on the mechanics of the risk management process.
Risk assessments
Security planning exercises
Review security in change management