SY0-701: 1.0 (General Security Concepts) Flashcards
CIA Triad (1.2)
Confidentiality (Encryption), Integrity (Hashes), Availability (Info is stored, accessed, and protected and all times)
Confidentiality (1.2)
Protection of information from unauthorized access and disclosure via:
Encryption
Access Controls
Data Masking
Physical Security Measures
Training and Awareness
Encryption (1.2)
Process of converting data into code to prevent unauthorized access
Access Controls (1.2)
Ensure only authorized personnel can access certain types of data using user permissions
Data Masking (1.2)
Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users (e.g. first part of credit card is masked with “X’s”)
Physical Security Measures (1.2)
Used to ensure confidentiality for physical types of data (e.g. papers locked in filing cabinet) and for digital information contained on servers and workstations (e.g. biometric access, smart card access, locked server rooms)
Training and Awareness (1.2)
Conducting regular training on the security awareness best practices that employees can use to protect the organization’s sensitive data
Integrity (1.2)
Helps to ensure information and data remain accurate and unchanged from their original state unless intentionally modified by an authorized individual in order to:
Ensure data accuracy
Maintain trust
Ensure system operability
Hashing (1.4)
One-way cryptographic function that takes an input and produces a unique message digest as its output (hash value is known as a hash digest which serves as a digital fingerprint)
Digital Signatures (1.2)
Uses encryption to ensure integrity and authenticity
Checksums (1.2)
Method to verify the integrity of data during transmission
Access Controls (1.2)
Ensure that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations
Regular Audits (1.2)
Involves systematically reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed
Availability (and how it’s measured) (1.2)
Used to ensure that information, systems, and resources are accessible and operational when needed by authorized users in order to:
Ensure business continuity
Maintain customer trust
Upholding an organizations reputation
(3 Nines = 99.9% uptime; 5 nines is gold standard)
Redundancy (1.2)
Duplication of critical components or functions of a system with the intention of enhancing its reliability:
Server redundancy
Data redundancy
Network redundancy
Power redundancy
Server Redundancy (1.2)
Using multiple servers in a load balance so that if one is overloaded or fails, the other servers can take over the load
Data Redundancy (1.2)
Storing data in multiple places (RAID, cloud-based backups
Network Redundancy (1.2)
Ensures that if one network path fails, the data can travel through another route
Power Redundancy (1.2)
Using backup power sources to ensure that an organization’s systems remain operational during periods of power disruption or outages within a local service area
Non-Repudiation (1.2)
Focuses on providing undeniable proof in digital transactions (e.g. Digitally signing email) in order to:
Confirm the authenticity of digital transactions
Ensure integrity of critical communications
Provide accountability
Digital Signature (1.2)
Non-Repudiation; Created by first hashing a particular message or communication to be digitally signed and encrypting the hash digest with the user’s private key using asymmetric encryption
AAA (1.2)
Authentication (Prove your identity), Authorization (Allowed to have access), Accounting (Data tracking, e.g. log file)
Authentication (1.2)
Security measure that ensures individuals or entities are who they claim to be during a communication or transaction
5 Methods of Authentication (1.2)
Something you Know (Knowledge Factor; Name/Password)
Something you have (Possession Factor; Smart Card)
Something you are (Inherence Factor; Biometrics)
Something you do (Action Factor; Typing/Speaking pattern)
Somewhere you are (Location Factor)