4.1 Explain common security concepts Flashcards
Confidentiality, integrity,
availability (CIA)
Confidentiality, Integrity, and Availability (CIA) are the foundational principles of information security. These principles guide organizations in protecting data and ensuring that it is secure from unauthorized access, tampering, or loss.
For the exam, it is essential to recognize that confidentiality ensures that sensitive information is only accessible to authorized users, often enforced through encryption and access controls. Integrity guarantees that data remains accurate and unaltered during storage and transmission, achieved through checksums, hashes, and version controls. Availability ensures that authorized users have access to data and resources when needed, supported by redundant systems, backups, and robust disaster recovery plans. Understanding the CIA triad helps in assessing risks and implementing effective security measures within a network.
Internal Threats
Internal threats refer to risks that originate from within an organization, typically posed by employees or contractors who have legitimate access to systems and data. These threats can be intentional, such as sabotage or data theft, or unintentional, like human error or negligence in handling sensitive information.
For the exam, it’s important to understand that internal threats can significantly compromise an organization’s security posture. Employees might misuse their access for personal gain or inadvertently expose data through careless actions. Organizations can mitigate internal threats by implementing strict access controls, regular security training, monitoring user activity, and establishing clear policies regarding acceptable use and data protection. Recognizing the potential for internal threats is crucial for developing a comprehensive security strategy.
External Threats
External threats refer to risks that originate outside an organization, typically from malicious actors such as hackers, cybercriminals, or competitors. These threats can take many forms, including malware attacks, phishing schemes, denial-of-service attacks, and data breaches, all aimed at compromising the security of an organization’s systems or data.
For the exam, it’s important to know that external threats often exploit vulnerabilities in software, networks, or human behavior to gain unauthorized access. Organizations can mitigate these threats by employing a multi-layered security approach, which includes firewalls, intrusion detection systems, regular software updates, employee training, and incident response plans. Understanding the nature of external threats is essential for developing effective security measures to protect an organization’s assets and information.
Common vulnerabilities and exposures (CVE)
Common Vulnerabilities and Exposures (CVE) is a publicly accessible database that provides a standardized way to identify and categorize vulnerabilities in software and hardware. Each CVE entry includes a unique identifier, a brief description of the vulnerability, and references to related security advisories and databases. This system allows security professionals and organizations to share information about vulnerabilities consistently.
For the exam, you should be familiar with how CVE helps organizations prioritize their security efforts. Knowing the CVE identifier format and how to use CVE databases to look up vulnerabilities relevant to your environment is important. CVEs play a crucial role in the cybersecurity landscape, enabling better communication and coordination in addressing security weaknesses across systems and applications.
Zero-day
A zero-day refers to a newly discovered vulnerability in software or hardware that is unknown to the vendor or developer and, consequently, has not yet been patched. The term “zero-day” signifies that the developers have had zero days to fix the vulnerability before it can potentially be exploited by attackers. Zero-day vulnerabilities are particularly dangerous because they can be exploited immediately upon discovery, often leading to significant security breaches.
For your exam, it’s essential to understand that zero-day attacks can occur without warning and can target various systems, making them difficult to defend against. You should also be aware of the importance of security measures like timely software updates, intrusion detection systems, and threat intelligence to mitigate the risks associated with zero-day vulnerabilities. Being prepared for zero-day threats is a critical aspect of maintaining a secure network environment.
Exploits
Exploits are specific pieces of software, code, or sequences of commands that take advantage of vulnerabilities in a system, application, or network. They are often crafted to gain unauthorized access or control over a target system, causing damage or compromising data. Exploits can target a variety of vulnerabilities, including software bugs, configuration flaws, or weaknesses in security protocols.
For your exam, it’s important to know that exploits can be categorized into different types, such as local or remote exploits, depending on whether they require physical access to the target system or can be executed over a network. Understanding the relationship between vulnerabilities and exploits is crucial since exploits are the methods attackers use to leverage weaknesses. Awareness of common types of exploits, like buffer overflow, SQL injection, or cross-site scripting (XSS), is also vital for implementing effective security measures and defenses in a network environment.
Least privilege
Least privilege is a security principle that stipulates users, systems, and applications should only have the minimum level of access necessary to perform their assigned tasks. This concept is essential in reducing the attack surface and limiting potential damage from security breaches. By restricting access rights, organizations can better protect sensitive information and systems from unauthorized use.
For the exam, it is important to understand that implementing the least privilege principle can help mitigate risks associated with insider threats and accidental misuse. This involves regularly reviewing and adjusting access permissions, employing role-based access control (RBAC), and ensuring that permissions are revoked promptly when they are no longer needed, such as during employee offboarding. Familiarity with concepts like permission auditing and access control lists (ACLs) can further reinforce your understanding of how least privilege is applied in practice.
Role-based access
Role-based access control (RBAC) is a security mechanism that restricts system access to authorized users based on their assigned roles within an organization. In this model, access permissions are grouped by role, and users are assigned to these roles according to their job responsibilities. This approach simplifies the management of user permissions and enhances security by ensuring that individuals can only access the information necessary for their specific roles.
For the exam, it’s crucial to know that RBAC helps enforce the principle of least privilege by limiting user permissions and reducing the risk of unauthorized access to sensitive data. Understanding the differences between role-based access and other access control models, such as discretionary access control (DAC) and mandatory access control (MAC), is also important. You might also want to be familiar with scenarios where RBAC is effectively implemented, such as in large organizations with various departments, and how to conduct regular audits of user roles to ensure they align with current job functions.
Zero Trust
Zero Trust is a security framework that operates on the principle of “never trust, always verify.” This approach assumes that threats can exist both inside and outside the network perimeter, meaning that no user or device should be automatically trusted based solely on their location within the network. Instead, every access request is thoroughly authenticated and authorized before granting access to resources, regardless of whether the request originates from inside or outside the organization.
For the exam, it’s important to understand that Zero Trust requires continuous verification of user identities, device security postures, and contextual factors like location and time. Key components of a Zero Trust architecture include multi-factor authentication (MFA), micro-segmentation, and least privilege access policies. You should also be familiar with how Zero Trust addresses modern challenges like remote work and cloud services, as well as the technologies and strategies used to implement this framework effectively. Understanding the differences between traditional perimeter-based security models and Zero Trust is essential for grasping its significance in contemporary cybersecurity.
Network segmentation enforcement
Network segmentation enforcement involves dividing a computer network into smaller, isolated segments to improve security, performance, and management. By creating distinct network segments, organizations can control traffic flow, limit access to sensitive data, and reduce the potential impact of security incidents. This approach is crucial for protecting critical systems and data from unauthorized access and attacks.
For the exam, you should know that segmentation can be enforced through various methods, including virtual LANs (VLANs), firewalls, and access control lists (ACLs). It’s also important to understand how segmentation can help meet compliance requirements and improve overall network performance by reducing broadcast traffic and enhancing resource allocation. Be prepared to discuss the benefits of segmentation, such as improved security through isolation, better network performance, and simplified management and monitoring of network traffic. Additionally, be familiar with how segmentation supports principles like least privilege and Zero Trust architectures.
Perimeter network [previously
known as demilitarized zone (DMZ)]
A perimeter network, previously known as a demilitarized zone (DMZ), is a physical or logical subnetwork that separates an organization’s internal network from untrusted external networks, typically the internet. The purpose of a perimeter network is to add an additional layer of security by allowing external access to certain services while protecting the internal network from potential threats. It typically hosts servers that need to be accessed from the outside, such as web servers, mail servers, and DNS servers.
For the exam, it’s essential to understand that the perimeter network acts as a buffer zone, reducing the risk of attacks directly impacting the internal network. You should know the key components, such as firewalls and intrusion detection systems, which help manage and monitor traffic between the perimeter network and both the internal network and the internet. It’s also crucial to recognize the importance of securing services in the perimeter network, implementing security policies, and ensuring that sensitive data is protected while allowing necessary external access.
- Separation of duties
Separation of duties is a security principle that involves dividing tasks and responsibilities among multiple individuals to reduce the risk of fraud, error, or misuse of power. By ensuring that no single person has control over all aspects of a critical process, organizations can create checks and balances that help safeguard assets and data. This principle is especially important in areas such as financial transactions, access controls, and system administration.
For the exam, you should understand that separation of duties is a key component of an effective internal control system. It prevents any one individual from having unchecked power, which could lead to unauthorized actions or fraud. It’s vital to know the different roles and responsibilities that can be separated, such as having one person responsible for approving transactions and another for executing them. Additionally, you may encounter questions about the implications of violating this principle and how to implement it effectively within an organization to enhance security and compliance.
- Network access control
Network access control (NAC) is a security solution that enforces policies regarding who can access a network and what resources they can use. It works by assessing the security posture of devices trying to connect to the network and can either grant or deny access based on established security policies. NAC solutions often check for factors such as antivirus status, operating system updates, and compliance with organizational security policies.
For the exam, you should know that NAC enhances security by ensuring that only devices meeting specific criteria can connect to the network. Key components of NAC systems include authentication mechanisms, policy enforcement, and continuous monitoring of device compliance. You may also encounter questions about different NAC implementations, such as port-based access control using protocols like IEEE 802.1X, and the role of NAC in preventing unauthorized access and mitigating risks associated with endpoint devices. Understanding the balance between security and user experience is crucial, as overly restrictive NAC policies can hinder productivity.
Honeypot
A honeypot is a security mechanism designed to attract and trap potential attackers by simulating vulnerabilities within a system or network. By creating a decoy environment, honeypots serve to monitor and analyze malicious activity, gathering intelligence about attack methods and tactics. This helps organizations improve their overall security posture by identifying weaknesses and responding to threats more effectively.
For the exam, it’s essential to recognize that honeypots can be classified into different types, such as low-interaction and high-interaction honeypots. Low-interaction honeypots simulate basic services to gather information, while high-interaction honeypots provide a more realistic environment, allowing attackers to interact with them. Understanding the benefits of deploying honeypots, such as threat intelligence collection and diverting attackers from real assets, is crucial. Additionally, you should be aware of the risks associated with honeypots, including the possibility of them being used as launching pads for attacks on other systems if not properly secured.
- Multifactor Authentication
Multifactor authentication (MFA) is a security process that requires users to provide multiple forms of verification before gaining access to an account or system. MFA enhances security by combining two or more factors, typically categorized as something you know (like a password), something you have (like a smartphone or hardware token), and something you are (biometric data, such as fingerprints or facial recognition). This layered approach makes it significantly more challenging for unauthorized users to gain access, as they would need to compromise multiple authentication factors.
For the exam, it’s important to know that MFA can significantly reduce the risk of unauthorized access and is a best practice for securing sensitive data and accounts. Familiarity with common MFA methods, such as SMS codes, authentication apps, and biometrics, is beneficial. Additionally, understand that while MFA greatly improves security, it can also introduce usability challenges, so balancing security and user convenience is vital when implementing MFA solutions.