1.2 Flashcards
Confidentiality
Ensures info is accessible only to authorized personnel
- protects personal privacy
- to maintain a business advantage
- to achieve regulatory compliance
Integrity
Ensures data remains accurate and unaltered (checksums)
- maintain trust
- to ensure system operability
Availability
Ensures info and resources are accessible when needed
non-repudiation
guarantees that an action or event cannot be denied by the involved parties
What are ways to achieve confidentiality
- Access Controls
- Encryption
- Data Masking
- Physical Security Measures
- making sure paper is stored in proper location
- Training and Awareness
What are ways to achieve integrity
Hashing
digital signatures
access controls (ensure only authorized users can modify data)
regular audits (ensure only authorized changes have been made)
What are ways to ensure availability?
redundancy
- Server, Data, Network, Power
5 commonly used authentication methods?
Something you know (knowledge factor)
Something you are
Something you have
Somewhere you are
Something you do
authentication is important why?
To prevent unauthorized access
To protect user privacy
Authorization
- pertains to the permissions and privileges granted to users or entities after they have been authenticated
Accounting
A security measure to track all user activities
Why is accounting important?
To create an audit trail
maintain regulatory compliance
perform resource optimization
achieve user accountability
What tools are used for accounting?
syslog servers
network analysis tools
SIEM systems
Gap Analysis
Process of evaluating the differences between an orgs current state and desired performance
Types of Gap analysis?
Technical - evaluating orgs current technical infrastructure and identifying where it falls short
Business- Involves evaluating an orgs business processes
POA&M
Plan of action and milestones
outlines the specific measures to address each vulnerability allocate resources and set up timelines for each remediation task
Zero Trust
demands verification for every device, user and transaction within the network
Zero Trust Control Plane
The overarching framework and set of components responsible for defining managing and enforcing the policies related to user and system access
adaptive identity
threat scope reduction
policy driven access control
secured zones
Adaptive Identity
relies on real time validation of user