Untitled Deck Flashcards
(313 cards)
Information Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Information Systems Security
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data
CIA Triad
Confidentiality, Integrity, Availability
Confidentiality
Ensures information is accessible only to authorized personnel (e.g., encryption)
Integrity
Ensures data remains accurate and unaltered (e.g., checksums)
Availability
Ensures information and resources are accessible when needed (e.g., redundancy measures)
Non-Repudiation
Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)
CIANA Pentagon
An extension of the CIA triad with the addition of non-repudiation and authentication
Triple A’s of Security
Authentication, Authorization, Accounting
Authentication
Verifying the identity of a user or system (e.g., password checks)
Authorization
Determining actions or resources an authenticated user can access (e.g., permissions)
Accounting
Tracking user activities and resource usage for audit or billing purposes
Security Control Categories
Technical, Managerial, Operational, Physical
Security Control Types
Preventative, Deterrent, Detective, Corrective, Compensating, Directive
Zero Trust Model
Operates on the principle that no one should be trusted by default
Control Plane (Zero Trust)
Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
Data Plane (Zero Trust)
Subject/system, policy engine, policy administrator, and establishing policy enforcement points
Threat
Anything that could cause harm, loss, damage, or compromise to our information technology systems
Threat Sources
Natural disasters, Cyber-attacks, Data integrity breaches, Disclosure of confidential information
Vulnerability
Any weakness in the system design or implementation
Vulnerability Sources
Software bugs, Misconfigured software, Improperly protected network devices, Missing security patches, Lack of physical security
Risk
The intersection of a threat and a vulnerability
Reasons Confidentiality is important
To protect personal privacy, To maintain a business advantage, To achieve regulatory compliance
Methods to ensure Confidentiality
Encryption, Access Controls, Data Masking, Physical Security Measures, Training and Awareness