SYO 701 - Jason Dion Flashcards
(36 cards)
Information Security
Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction.
*Securing the Data, not the Systems
Information Systems Security
Act of protecting the system that hold and process the critical data
CIA Triad
Confidentiality - ensures that information is only accessible to those with the appropriate authorization.
Integrity - ensured that data remains accurate and unaltered unless modification is required.
Availability - ensures that information and resources are accessible and functional when needed by authorized users
Non Repudiation
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved
AAA of Security
Authentication - Process of verifying the identity of a user or system
Authorization - defines what actions or resources a User can access
Accounting - act of tracking user activities and resource usage, typically for audit or billing purposes
Security Controls
Technical -
Managerial (Administrative) -
Operational -
Physical -
Zero Trust
New Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.
Vulnerability
Any weakness in the system design or implementation
Risk Management
Finding different ways to minimize the likelihood of an outcome occurring and achieve the desired outcomes
Confidentiality
Refers to the protection of information from unauthorized access and disclosure
- Protect personal privacy
- Maintain a business advantage
- Achieve regulatory compliance
Encryption
Process of converting data into code to prevent unauthorized access. Data is scrambled, aka Cypher Text, and can only be viewed using the correct decryption key.
Access Controls
Ensure only authorized personal can access certain types of data
Data Masking
Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data authenticity and use for authorized users
Physical Security Measures
Used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.
Training and Awareness
Conducting regular training on the security awareness best practices that employees can use to protect the organization’s sensitive data
Integrity
Helps to ensure information and data remain accurate and unchanged from their original state unless intentionally modified by an authorized individual. Verifies the accuracy and trustworthiness of data over the entire lifecycle.
*Ensure Data Accuracy
*Maintain Trust
*Ensure System Operability
In order to maintain Integrity, we utilize the following:
1 - Hashing
2 - Digital Signatures
3 - Checksums
4 - Access Controls
5 - Regular Audits
Hashing
The process of converting data into a fixed-size value
*Hash Digest
Digital Signatures
Use Encryption to ensure integrity and authenticity
*Hash > Hash Digest > Encrypted with Private Key > Digital Signature
Checksums
Method to verify the integrity of data during transmission
Access Controls
Ensure that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations.
Regular Audits
Involve reviewing logs and operations to ensure that only authorized changes havce been made and any discrepancies are addressed.
Authentication
Security measure that ensures individuals or entities are who they claim to be during a communication or transaction
*Something you know (Username/ PW)
*Something you have (VPN token)
*Something you are (Bio-metric)
*Something you do
*Somewhere you are (geographic location)
2FA - Two Factor Authentication
MFA - Multifactor Authentication
Authorization
Permissions and privileges granted to Users or Entities after they have been Authenticated
Zero Trust
“Trust nothing and verify everything”
Demands Verification for every device, user, and transaction within the Network, regardless of its origin.
Cybersecurity approach that assumes no User or system is trusted by default and requires continuous verification for access to organizational resources