1- Mastering the Basics Flashcards
Core Security Principles: Confidentiality
Confidentiality ensures that data is only viewable by authorized users. If there is a risk of sensitive data falling into the wrong hands, it should be encrypted to make it unreadable. Any data should be protected with access controls to enforce confidentiality.
Core Security Principles: Integrity
Integrity is used to verify that data has not been modified, and loss of integrity can occur through unauthorized or unintended changes. Hashing algorithms such as MD5, HMAC, or SHA1 can calculate hashes to verify integrity. A hash is simply a number created by applying the algorithm to a file or message at different times. The hashes are compared to each other to verify that integrity has been maintained.
Core Security Principles: Availability
Availability ensures that systems are up and operational when needed and often addresses single points of failure. You can increase availability by adding fault tolerance and redundancies such as RAID, clustering, backups, and generators. HVAC systems also increase availability.
Core Security Principles: Non-repudiation
Non-repudiation is used to prevent entities from denying they took an action. Digitally signed e-mail prevents individuals from later denying they sent it. An audit log provides non-repudiation since audit log entries include who took an action in addition to what the action was, where the action took place, and when it occurred.
Core Security Principles: Defense in Depth
Security is never “done.” Instead, security and IT professionals constantly monitor, update, add to, and improve existing methods. A single layer of security is easily beatable. Defense in depth employs multiple layers to make it harder for attacks to exploit a system or network.
Basic Risk Concepts: Risk/ Risk Mitigation
Risk is the likelihood that a threat will exploit a vulnerability. Risk mitigation reduces the chances that a threat will exploit a vulnerability by implementing controls.
Authentication Concepts: Identification, Authentication, Authorization
Identification occurs when a user claims an identity. Authentication occurs when the user proves the identity (such as with a password) and the credentials are verified. Authorization is granted to resources based on a proven identity.
Authentication Concepts: 3 Factors of Authentication
The three factors are: 1) Something you know (such as username and password), 2) Something you have (such as a smart card), and 3) Something you are (such as a fingerprint or other biometric identification).
Any 2+ is considered multifactor authentication.
Authentication Concepts: First Factor of Authentication
The first factor of authentication (something you know, such as a password or PIN) is the weakest factor. Passwords should be strong, changed regularly, never shared with another person, and stored in a safe if written down. Technical means (such as a technical password policy) should be used to ensure that users regularly change their passwords and don’t use the same passwords.
Authentication Concepts: First Factor of Authentication– Strong Passwords
Strong passwords use a mix of character types with a minimum password length such as eight or ten characters. The key space of a password is calculated as C ^ N where C indicates the number of possible characters in the password, and the N indicates the password length.
Authentication Concepts: First Factor of Authentication– Password History
Password history is combined with a minimum password age to prevent users from reusing the same passwords.
Authentication Concepts: First Factor of Authentication– Default Passwords
Many systems and devices have default passwords. A basic security practice is to change these defaults as soon as the system or device is installed.
Some administrators go a step further and add a dummy user account named “administrator.” This account has no permissions. If this account is discovered to be locked out, the administrator knows that someone was trying to guess the password.
Authentication Concepts: Second Factor of Authentication
The second factor of authentication (something you have, such as a smart card, key fob, or proximity card) is commonly combined with something you know. Smart cards have embedded certificates issued by a Public Key Infrastructure (PKI). Both smart cards and key fobs provide a significant level of secure authentication, especially when used with another factor of authentication (multifactor authentication).
Authentication Concepts: Second Factor of Authentication– Examples
The second factor of authentication (something you have, such as a smart card, key fob, or proximity card) is commonly combined with something you know. Smart cards have embedded certificates issued by a Public Key Infrastructure (PKI). Both smart cards and key fobs provide a significant level of secure authentication, especially when used with another factor of authentication (multifactor authentication).
Similarly, a personal identity verification (PIV) card is a specialized type of smart card used by United States federal agencies.
CACs and PIVs are specialized smart cards that include photo identification. They are used to gain access into secure locations, and can also be used to log onto computer systems.
Authentication Concepts: Third Factor of Authentication
The third factor of authentication (something you are, defined with biometrics) is considered the strongest method of authentication since it is the most difficult for an attacker to falsify. Physical biometrics (such as fingerprints) and behavioral biometrics (such as voice recognition) can be used to authenticate individuals.