2.1 What is InfoSec Flashcards
Defining Security: Security involves :
*
protecting assets from various threats, including cyberattacks and natural disasters, with a focus on the most likely risks.
Types of Assets: Assets can be ______________or _____________ and both types require protection.
*
physical (like hardware) or intangible (like data),
Value: In modern computing environments, _____________________ often hold equal or greater value than physical assets.
*
logical assets (data and intellectual property)
Definition of Information Security: Information security is about __________________________.
*
safeguarding information systems from unauthorized access and misuse.
Security vs. Usability: A secure system may be impractical; increasing security typically reduces __________, necessitating a balance between the two.
*
productivity;
Cost vs. Value in Security: Security measures should be _________________ to the value of the asset being protected; excessive security for low-value items is inefficient.
*
proportional
Defining Security Levels: Determining when a system is ______________ is complex; no single measure guarantees complete security.
*
secure
Identifying Insecurity: Examples of insecure practices include failing to apply _____________ or _______________; recognizing these helps mitigate risks.
*
updates or using weak passwords
Legal Standards for Security: _________ ___________ for security vary by industry and country; organizations must comply with relevant laws to avoid violations.
*
Legal frameworks
Regulatory Examples: Specific regulations like _________ and __________ provide guidelines for what constitutes adequate security in various sectors.
*
PCI DSS; HIPAA
Models for Security Discussion: Having models like the CIA triad helps ______________ discussions around security concepts among professionals.
*
standardize
CIA Triad Explanation: The CIA triad—______________ __________ ____________—serves as a foundational model for understanding information security.
*
confidentiality, integrity, and availability
: ______________ involves protecting data from unauthorized access through various means at different levels.
*
Confidentiality
______________ ensures that data remains unchanged except by authorized users; mechanisms like permissions help maintain this principle.
*
Integrity
______________ ensures data is accessible when needed; disruptions can arise from various issues like attacks or system failures.
Availability
*
CIA Triad Application: The CIA triad aids in ___________________ by highlighting potential breaches in confidentiality, integrity, or availability.
*
analyzing specific security incidents
The ______________expands on the CIA triad by including possession/control, authenticity, and utility for a more comprehensive understanding of security.
*
Parkerian hexad
This principle focuses on the _________________of data storage media and its implications for _____________ and ______________.
*
physical control ; confidentiality and integrity.
______________ verifies that data originates from the correct source; _________________ can help enforce this principle.
*
Authenticity - digital signatures
____________ assesses how useful data is; it varies based on context and can impact how effectively data serves its purpose.
*
Utility
Application of Models in Security Discussions: Both the __________ and __________________ provide frameworks for discussing potential security failures and necessary controls.
*
CIA triad , Parkerian hexad