1.2 : Security Concepts Flashcards

Summarize fundamental security concepts

1
Q

CIA Triad

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Protecting information from unauthorized access. Examples: Encryption, access control lists. An attack would seek to disclose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Ensuring data is accurate and unaltered. Examples: Hashing, digital signatures. An attack would seek to corrupt / alter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Ensuring systems and data are accessible to those who are authorized when needed. Examples: Redundant systems, backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non-repudiation

A
  • Non-repudiation ensures that a party cannot deny the authenticity/origin of their communications and transactions.
  • Digital Signatures (certificates) are the most common method used to achieve non-repudiation.
  • Key Tools: Public Key Infrastructure (PKI), audit logs, and blockchain (in some contexts).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AAA

A
  • Authentication, Authorization, and Accounting
  • Framework for controlling access, determining user permissions, and logging user actions.
  • Examples: Login credentials (authentication), role-based access (authorization), audit logs (accounting).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication (People)

A

Verifying the identity of individuals before granting access. Examples: Passwords, biometrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication (Systems)

A

Verifying the identity of devices or systems before communication. Examples: Digital certificates, token-based authentication, API keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorization Models

A

Ways of defining what an authenticated user or system is allowed to do. Examples: Role-based access control (RBAC), attribute-based access control (ABAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Gap Analysis

A

Process of comparing current security posture to desired security levels to identify and document gaps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero Trust

A

A security model that assumes no implicit trust and continuously verifies every access request as though it originates from an open network. Examples: Multi-factor authentication, least privilege access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Control Plane (Zero Trust)

A

Manages policies and decisions in a Zero Trust architecture. Examples: Adaptive identity, policy-driven access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Plane (Zero Trust)

A

Enforces policies on data access in a Zero Trust model. Examples: Implicit trust zones, policy enforcement points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical Security

A

Measures to protect physical assets from unauthorized access or harm. Examples: Bollards, fencing, video surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bollards

A

Physical barriers used to prevent vehicle access to a protected area. Examples: Concrete barriers, retractable bollards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access Control Vestibule

A

A secure entryway that restricts access to a building or room. Examples: Mantraps, double-door systems.

17
Q

Fencing

A

A physical barrier to deter and prevent unauthorized access.

18
Q

Video Surveillance

A

Cameras and monitoring systems used to observe and record activity.

19
Q

Security Guard

A

Personnel responsible for monitoring and protecting physical premises.

20
Q

Access Badge

A
  • Physical security measure.
  • An identification card that grants access to restricted areas.
  • Examples: RFID cards, smart cards.
21
Q

Lighting

A

Using lighting can enhance security and deter unauthorized access. Examples: Motion-activated lights, perimeter lighting.

22
Q

Sensors

A

Devices that detect physical conditions or changes in the environment. Examples: Infrared sensors, pressure sensors, microwave sensors, ultrasonic sensors.

23
Q

Deception Technology

A
  • Techniques used to mislead attackers and disrupt their activities.
  • Attract attackers and gather data on their methods
  • Examples: Honeypots, honeyfiles, honeynets.
24
Q

Honeypot

A

A decoy system used to attract and detect attackers. Examples: Fake servers, simulated databases.

25
Q

Honeynet

A
  • A network of honeypots designed to capture extensive attack data.
  • A fake network environment used to study attack behaviors.
26
Q

Honeyfile

A

A bait file placed in a system to detect unauthorized access. Examples: Fake confidential documents, decoy financial records.

27
Q

Honeytoken

A

Authentication method of some kind, a token, used to detect unauthorized access. Examples: Fake credentials, decoy API keys.