2.0a Security Principles Flashcards
Basic Security Principles
Confidentiality
Ensuring sensitive data is only accessible to authorized individuals or entities and protected from unauthorized disclosure.
Integrity
Maintaining the accuracy, consistency, and trustworthiness of data and information throughout it’s lifecycle.
Availability
Ensuring information and resources are accessible and usable by authorized users when needed.
Authentication
Verifying the identity of users, systems, or divices to ensure they are who they claim to be.
Authorization
Granting appropriate access rights and privileges to authorized users based on their roles and responsibilities.
Non-Repudiation
Ensuring the origin and receipt of information or transactions can be verified and parties cannot deny their involvement.
Defense in Depth
Implementing multiple layers of security controls to protect against various types of cyber threats and attacks.
Least Privilege
Providing users with the minimum level of access necessary to perform their tasks, reducing the risk of unauthorized access or misuse.
Separation of Duties
Assigning different tasks and responsibilities to different individuals to prevent any single person from having complete control over critical processes.
Auditability and Accountability
Keeping track of security events and actions, enabling traceability and accountability in case of security incidents.
Defense in Breadth
Extending security controls across various layers and components of an IT system to provide comprehensive protection against diverse cyber threats.
Privacy
Ensuring the protection of individuals’ personal and sensitive information from unauthorized access or disclosure.
Security by Design
Integrating security measures and considerations from the early stages of system design and development.
Incident Response
Having a well-designed and practiced plan to respond to security incidents promptly and effectively.
Patch Management
Regularly applying security patches and updates to software and systems to address known vulnerabilities