1.2 Summarize fundamental security concepts Flashcards
Confidentiality
Information is accessible only to authorized personnel
Integrity
data remains accurate and unaltered
availability
data and resources are accessible when needed (e.g redundancy measure
How do we achieve Availability
Redundancy : back up options of critical components or functions of system with the intention of enhancing its reliability
Various type of redundancy
Server Redundancy
Data Redundancy
Network Redundancy
Power Redundancy
Non Repudiation
provides proof of the origin, authenticity and integrity of data.
can’t deny having performed an action
How do we achieve Non Repudiation
Digital Signature : hashing then, encrypting the hash digest with the user private key.
Why Non Repudiation is important
- Confirming the authenticity of Digital Signature
- Ensuring Integrity
- Providing Accountability
Authentication
Verifying the identity of individuals or entities in digital interactions
Five commonly used authentication methods
Something you know : knowledge factor ( username, password
Something you have : possession factor, physical item ( ID, phone)
Something you are : Inherence factor :unique physical or behavioral characteristics ( biometric authentication )
Something you do : Action factor, user conducting a unique action
Somewhere you are : location factor user being in certain geographic location
2FA and MFA
Two authentication method
Two or more authentication methods
Why authentication is critical
- Prevent unauthorized access
- protect user data and privacy
- Ensure resources validity
Authorization
Determining actions or resources an authenticated user can access (permission: who can access what)
Set of rules and policies to dictate who can access, or modify what.
Authorization mechanisms
role-based
rule- based
attribute - based controls
Why authorization is important
- protect sensitive data
- maintain system integrity
- create more streamline the user experience
serve as gatekeeper
Accounting
all user activities are properly tracked and recorded ( monitoring and logging)
why we need accounting
to achieve
- transparency
- Security
- Accountability
What are we accounting in the system
logging and accessing files
modifying configurations
downloading or installing software
attempting unauthorized actions
what are some of accounting systems
Audit Trail ( chronological record of all user activities)
Regulatory Compliance : maintain a comprhensive record of all the users’ activities.
Forensic Analysis: detail accounting and event logs
Resource Optimization : tracking resource utilization and allocation decision
User Accountability
Technologies used for accounting
Syslog servers : aggregate logs from various network devices and systems
Network analysis tools : like wireshark capture and analyze network traffic
SIEMs : Security Information and Event Management : real-time analysis of security alerts.
6 Types of Security Control
- Preventative control
- Deterrent Controls : warning
- Detective Controls : detect and alert
- Corrective Controls : address issue after they arise
5/ Compensating Controls : alternative - Directive Controls : dictate specific action
Methods to achieve integrity
checksums: method to verify integrity of data during transmission.
Access Control: only authorized individuals can modify data.
Regular Audits: review logs and operations.
Hashing: process of converting data into fixed size values.
Digital Signature: uses encryption to ensure integrity and authenticity
Integrity is important for three main reasons
■ To ensure data accuracy
■ To maintain trust
■ To ensure system operability
How to achieve Confidentiality
Encryption: convert data to code
Access Control: authorized personnel only access certain data
Data masking: obscuring data with in database
Physical Security
Training and awareness
CIA triad
Basis for the development of Security
confidentiality : making sure data is kept secret or private.
Integrity : making sure data is trustworthy and free from tempering.
Availability: make sure system is functioning and accessible