1 Security Principles Flashcards
5 Domains
1 Security Principles 2 Business Continuity, Disaster Recovery, and Incident Response (10%) 3 Access Control Concepts 4 Network Security 5 Security Operations
ISC2 Canon 1
Protect society, the common good, necessary public trust and confidence, and the infrastructure
ISC2 Canon 2
Act honorably, honestly, justly, responsibly, and legally
ISC2 Canon 3
Provide diligent and competent service to principals (employer or client)
ISC2 Canon 4
Advance and protect the profession
3 main goals/concerns of information security
CIA
Confidentiality:
ensuring only authorized individuals have access to information and resources
Integrity:
protecting information from unauthorized changes
Availability:
ensures authorized access to systems and data whenever needed
Confidentiality concerns/attacks (5):
1 Snooping, 2 dumpster diving, 3 eavesdropping, 4 wiretapping (electronic eavesdropping) 5 social engineering
Integrity attacks (4)
1 unauthorized modification 2 impersonation (social engineering) 3 MITM 4 replay
Availability disruptions (5)
1 DoS 2 power outages 3 hardware failure 4 destruction of equipment 5 service outages
Access Control - 3 steps
1 Identification (“i’m Dave” , username) 2 authentication (ID, password) 3 Authorization (permissions)
AAAs
Authentication, Authorization, Accounting
An SSO ______
shares authenticated sessions across systems
Privacy concerns/responsibilities (3)
1- we are concerned about our own private information
2 - we have a responsibility to educate users in our own organization
3 - we have a responsibility to assist privacy officials
2 common forms of private information
1 PII 2 PHI
A legal principle that privacy programs are based on
Reasonable Expectation of Privacy
The main responsibility of a cybersecurity professional is to
Manage Risk
Main Risk categories (2)
1 Internal
2 External
Risk shared among different organizations
Multiparty Risk (SaaS attack)
Risk assessment =
- the process of identifying and triaging risks (prioritize) based on the likelihood of occurrence and the expected impact
Threat =
- external forces that jeopardizes the security of your information and systems
Threat vector
the method that an attacker uses to get to your target
Vulnerabilities
- weaknesses in your security controls that a threat might exploit to undermine the CIA of your information or systems