2. Fundamentals Of Security Flashcards
Information Security
Protecting data and information from unauthorized access, modification, disclosure, and disruption.
Information Systems Security
Protecting the systems that hold and process critical data
CIA Triad
Confidentiality
Ensure information is accessible only to authorized personnel.
e.g. encryption
CIA Triad
Integrity
Ensure data remains accurate and unaltered.
e.g. checksums
CIA Triad
Availability
Ensure information and resources are accessible when needed.
e.g. redundancy measures.
Non-Repudiation
Guarantees that an action or event cannot be denied by the involved parties.. e.g.. digital signatures
Authentication
Verify the identity of a user or system
Authorization
Determining actions or resources an authenticated user can access.
e.g. permissions
Accounting
Tracking user activities and resource usage for audit or billing purposes.
Security Control Categories
Technical
Managerial
Operational
Physical
Security Control Types
Preventative
Deterrent
Detective
Corrective
Compensating
Directive
Zero Trust Model
Operates on the principle that no one should be trusted by default.
Zero Trust is achieved by:
Control Plane - Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
Data Plane - Subject/system, policy engine, policy administrator and establishing policy enforcement points
Threat
Anything that could cause harm, loss, damage, or compromise to our information technology systems
Vulnerability
Any weakness in the system design or implementation
Risk of the system is located
Where threats and vulnerabilities intersect