501 Chapter 1 Flashcards
Describes a goal an organization wants to achieve
use case
____ prevents unauthorized disclosure of data
Confidentiality
____ scrambles the data
Encryption
____ helps ensure that only authorized persons can access the data through Identification, Authentication, Authorization
Access Controls
the practice of concealing a data on to another data
Steganography
the practice of making a data uninterpretable
Obfuscation
____ provides assurance that the data has not changed. Ensures that no one has modified, tampered with or corrupted the data.
Integrity
A ____ is a number created by a hashing algorithm
hash
commonly used in emails, provides nonrepudiation
digital signatures
an electronic password that allows a user to securely transfer data over the Internet using PKI
digital certificate
____ indicates that data and services are available when needed
Availability
adds duplication to critical systems and provides fault tolerance
redundancy
the common goal of redundancy is to remove
SPOF
SPOF stands for
Single Point of Failure
a redundancy technique: see RAID 1, RAID 5, RAID 10, allows a system to operate even if a disk fails
Disk Redundancies
a redundancy technique: see backup servers, remote servers
Server Redundancies
a redundancy technique: uses multiple servers to support a single service
Load Balancing
a redundancy technique: see alternate site or hot site where in the event of the original site is no longer capable of functioning
Site Redundancies
a site that is available 24/7 with employees
hot site
a site where employees need to go move to and start systems
cold site
a redundancy technique: see data backup, Grandfather-Father-Son backup
Backups
a redundancy technique: see UPS, Generator
Alternate Power
a redundancy technique: reduces outages from overheating
Cooling Systems
use a set of changes to update, improve or debug
Patching
basic goal of IT security is to
reduce risk
is the possibility or the likelihood of a threat exploiting a vulnerability resulting in a loss
Risk
is any circumstance or event that has the potential to compromise confidentiality, integrity, availability
Threat
is a weakness. It can be in hardware, software, configuration or OS
Vulnerability
is an adverse event or series of events that can negatively affect the CIA of an organization. includes: attacks, malware, data loss, etc
Security Incident
reducing the risk or reducing the chance a threat will exploit a vulnerability: by implementing controls and many more actions to be discussed at later chapters
Risk Mitigation
reduces risk
Security Control
List the three primary control types
Technical Controls
Administrative Controls
Physical Controls
____ is a technical control used to protect the confidentiality of data.
This includes data transferred over a network and data stored in devices, such as servers, PC, mobile
Encryption
once installed, provides protection against malware infection
Antivirus Software