1: Fundamentals of Security Flashcards
CIA Triad/CIANA
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
Triple A’s of Security
Authentication
Authorization
Accounting
Zero Trust Model
No one should be trusted on default
Threat
Anything that could cause harm, loss, damage, or compromise to our information
technology systems
Vulnerability
Any weakness in the system design or implementation
Risk Management
Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome
Technical Controls
Technologies, hardware, and software mechanisms that are implemented
to manage and reduce risks
Managerial Controls
Involve the strategic planning and governance side of security
Operational Controls
Procedures and measures that are designed to protect data on a
day-to-day basis
Physical Controls
Tangible, real-world measures taken to protect assets