Security Principles Flashcards
CC Domain 1, including the foundational concepts of cybersecurity. (40 cards)
Confidentiality
is the secrecy of the information within the asset being protected. Confidentiality is the most common form of protection that cyber criminals seek to compromise.
Access controls
are processes, tools, or configuration settings that ensure that access to data is restricted to only those individuals who are authorized to access it.
Access controls are mechanisms to ensure that only those persons or resources who are specifically authorized to access an information resource are allowed to have such access.
Cryptography
makes data unreadable except to authorized persons and protects the confidentiality of data while the data is at rest (in storage) or while it is being transmitted.
Integrity
data is not being altered or corrupted in any way
hashes
which is a technique to detect if the contents of a data file or any data set have been altered from their original source.
Availability
vailability attacks are commonly known as denial of
service (DoS) attacks,
Threat actors
are cyber criminals who seek to compromise the confidentiality, integrity, oravailability of these information assets.
Authentication
is the method by which systems verify that a user who is
requesting access to a resource really is who they claim to be.
Nonrepudiation
guarantee that a sender of a message cannot later deny that they sent the message
Information assurance
refers to the measure of information security goal of information assurance is to verify and ensure the confidentiality, integrity, and availability of data and assets, and this can only be done by
measuring the effectiveness of security controls.
Conduct Research
The first step the cyber criminal performs in an attack is to gather as much information as possible about the target to be able to carry out the attack.
Identify Targets
During this phase the attacker tries to identify the organization’s
information assets as well as their corresponding vulnerabilities that can be exploited
Exploit Targets
Once the targets are identified, the attacker can design and execute the attack. This involves probing and taking advantage of specific
vulnerabilities with the goal of gaining unauthorized access to the
enterprise.
Do Bad Things
Once the attacker gains access, they can do a variety of things to achieve their objective. Usually, the attacker attempts to expand access laterally throughout the network to explore and discover more systems and data to gain deeper access and perform more attacks.
Risk Management
is the term used to describe the discipline of how an organization chooses and implements the right level of security that is appropriate for them and their situation or business.
Risk Identification
identify the potential threats the organization may face and document in risk ledger.
threat modeling
process of examining each asset, the potential threats faced by each asset, and the adverse effects caused by the threat against the asset.
Risk Management Tiers
Organizational tier Addresses risk by defining and implementing
a holistic risk management program that applies to the entire
organization
* Mission/business process Addresses the risks of major functions
of the business
* Information system Addresses the risks of specific information
systems
Transfer risk
make it somebody else’s problem (risk
transference). The most common form of risk transference is to buy
insurance. Outsource the risk
Accept the risk
means that as long as the risk is within
acceptable levels, the organization can “live with” the risk and take
their chances (risk acceptance)
risk appetite
Avoid the risk
stopping the related activity or shutting down a system entirely (risk avoidance)
The most common example of
this is shutting down services or software applications that have
known flaws or vulnerabilities.
Mitigate
reduce the risk by putting in some kind of control or
countermeasure (risk mitigation) ->fix
Risk Tolerance
Level of variation(tolerance)
Risk Priorities
identify risk -> risk ledger
access damage