1.2 Summarize fundamental security concepts. Flashcards
What does the CIA Triad include?
Confidentiality
Integrity
Availability
Confidentiality
Ensures sensitive information is only accessible to authorized users and remains shielded from unauthorized access.
Integrity
Guarantees data is accurate, unaltered, and trustworthy by preventing unauthorized changes. Hashing algorithms such as SHA1 or MD5 provide data integrity.
Availability
Ensures data and services are accessible when needed, minimizing disruptions in access.
What does non-repudiation ensure?
Accountability in digital actions by preventing denial of involvement.
Mechanisms include digital signatures, authentication, and audit trails to establish the origin and legitimacy of actions or communications.
AAA
Authentication
Authorization
Accounting
Authentication
Verifies the identity of users or systems seeking access. For systems, protocols like 802.1X validate endpoint certificates.
Authorization
Determines what actions users or systems can perform within the network.
Accounting
Tracks and logs user activities, resource access, and actions performed for compliance and troubleshooting.
AAA protocols
RADIUS
Diameter
TACACS+
RADIUS
Used in remote access scenarios; secures sensitive data exchange between clients and servers using shared secrets.
Diameter
Successor to RADIUS, supporting modern networks like 4G/5G.
TACACS+
Developed by Cisco, grants or denies access to network devices while enhancing security with shared secrets.
What is gap analysis?
A strategic process to evaluate an organization’s security posture against standards and best practices.
Includes assessment, benchmarking, identifying gaps, prioritization of risks, and a remediation strategy.
Key tasks of gap analysis process
Assessment, benchmarking, identifying gaps, prioritization of risks, and a remediation strategy.
Assessment (gap analysis process)
A thorough assessment is conducted to
understand the organization’s current security measures,
policies, procedures, and technologies.
Benchmarking (gap analysis process)
This involves comparing the existing
security practices against established industry standards frameworks, and compliance regulations.
Identification (gap analysis process)
Gaps are pinpointed by identifying areas where security measures fall short of the desired or required level
Prioritization (gap analysis process)
Not all gaps are equal in terms of risk.
Prioritization involves ranking the identified gaps based on their potential impact and likelihood of exploitation.
Remediation strategy (gap analysis process)
With prioritized gaps in mind, a comprehensive remediation strategy is developed. This strategy outlines actionable steps to close the identified gaps
and enhance the organization’s security posture.
What is zero trust in cybersecurity?
The principle of “never trust, always verify,” ensuring continuous validation of users and devices.
Involves concepts like adaptive identity, policy-driven access control, and threat scope reduction.
What is the control plane in a zero-trust model?
The command center that manages user/device authorization based on policies and threat intelligence.