Basics Flashcards
Confidentiality
Information has not been disclosed to unauthorized people
Integrity
Information has not been modified or altered without proper authorization
Availability
Information is able to be stored, accessed, or protected at all times
AAA of Security
Authentication
Authorization
Accounting
CIA Triad
Confidentiality
Integrity
Availability
Authentication
When a person’s identity is established with proof and confirmed by a system ● Something you know ● Something you are ● Something you have ● Something you do ● Somewhere you are
Authorization
Occurs when a user is given access to a certain piece of data or certain
areas of a building
Accounting
Tracking of data, computer usage, and network resources
Non-repudiation occurs when you have proof that someone has taken an
action
Security Threats
Malware
Unauthorized Access
System Failure
Social Engineering
Mitigating Threats Approaches
Physical Controls
Technical Controls
Administrative Controls
Physical Controls
Alarm systems, locks, surveillance cameras, identification cards, and
security guards
Technical Controls
Smart cards, encryption, access control lists (ACLs), intrusion detection
systems, and network authentication
Administrative Controls
Policies, procedures, security awareness training, contingency planning,
and disaster recovery plans
User training is the most cost-effective security control to use
Five Types of Hackers
White Hats Black Hats Gray Hats Blue Hats Elite
White Hats
Non-malicious hackers who attempt to break into a company’s
systems at their request