1.2 Summarize fundamental security concepts. Flashcards

1
Q

CIA Triad

A
  • Confidentiality
  • Integrity
  • Availability

CIANA Pentagon: +non-repudiation and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Availability

A

Think about Redundancy

Ensures information and resources are accessible when needed. Duplication of critical components or functions of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Non-repudiation

A

Think about Digital Signature

Focused on providing undeniable proof in the world of digital transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Think about Hashing

Ensures data remains accurate and unaltered (e.g., checksums)

  • Hashing
  • Digital Signatures
  • Checksums
  • Access Controls
  • Regular Audits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality

A

Think about Encryption

Ensures information is accessible only to authorized personnel.

  • Encryption
  • Access Controls
  • Data Masking
  • Physical Security Measures
  • Training and Awareness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A
  • Something you know (Knowledge Factor) - Passwords, PINs, security questions
  • Something you have (Possession Factor) - Smart cards, security tokens, or mobile phones
  • Something you are (Inherence Factor) - Fingerprint scans, facial recognition, voice recognition. STRONGEST method. Iris and retina are the STRONGEST
  • Something you do (Action Factor) - Typing patterns, signature analysis, or gesture recognition
  • Somewhere you are (Location Factor) - GPS location, IP address-based location detection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accounting

A

Ensure that every action in the system is tracked and recorded

  • Syslog Servers - Used to aggregate logs from various network devices and systems
  • Network Analysis Tools - Used to capture and analyze network traffic
  • Security Information and Event Management (SIEM) Systems - Provide with a real-time analysis of security alerts generated by various hardware and software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero Trust

A

Demands verification for every device, user, and transaction within the network, regardless of its origin

  • Control Plane: brain that makes and manages access rules.
    • Policy Engine: Decides if access is allowed.
    • Policy Administrator: is responsible for communicating the decisions made by the PE to PEP
  • Data Plane: Where people or systems attempt to access resources.
    • Subject/System: The person, device, or service requesting access.
    • Policy Enforcement Point (PEP): The gate that allows or denies access based on rules.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Door Locks

A
  • Traditional Padlocks. Minimal protection, easily bypassed
  • Basic Door Locks. Vulnerable to techniques like lock picking
  • Modern Electronic Door Locks. Enhanced security through various authentication methods
  • Cipher Locks
    • Mechanical locks with numbered push buttons
    • Commonly used in high-security areas, such as server rooms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly