CH 1 Mastering the basics of Security Flashcards
___, ___, and ___ together form the security triad.
Confidentiality, integrity, and availability
____ helps prevent the unauthorized disclosure of data. It uses multiple methods, such as authentication combined with access controls, and cryptography.
Confidentiality
______ provides confidentiality by encrypting data. Many different encryption algorithms are available to provide confidentiality.
Cryptography
Many elements of security help to enforce confidentiality beyond encryption. These include elements such as ____, ____, ____, and ____ that combine to ensure only authorized personnel can access the data.
authentication
access control methods
physical security
permissions
______ ensures that data is only viewable by authorized users. If there is a risk of sensitive data falling into the wrong hands, it should be encrypted to make it unreadable. Any data should be protected with access controls to enforce ____.
Confidentiality
_____ provides assurances that data has not been modified, tampered with, or corrupted. Ideally, only authorized users modify data.
Integrity
a____ is simply a number created by executing a hashing algorithm against
data such as a file or message.
hash
____ provides assurances that data has not modified, tampered with, or corrupted.
Integrity
____verifies integrity.
Hashing
___is used to verify that data has not been modified, and loss of ____ can occur through
unauthorized or unintended changes. Hashing algorithms such as MD5, HMAC, or SHA1 can calculate hashes to
verify integrity.
Integrity
A___ is simply a number created by applying the algorithm to a file or message at different
times. The ___ are compared to each other to verify that integrity has been maintained.
hash
____ indicates that data and services are ____ when needed. For some companies, this simply means that the data and services must be ____ between 8 a.m. and 5 p.m., Monday through Friday. For other companies, this means they must be ____ twenty-four hours a day, seven days a week, 365 days a year.
Availability
(Availability):
Fault-tolerant disks such as RAID-1 (mirroring) and RAID-5 (striping with parity) allow a system to
continue to operate even if a disk fails.
Disk redundancies.
(Availability):
Failover clusters can be implemented that will allow a service to continue to be provided even
if a server fails. In a failover cluster, the service switches from the failed server in a cluster to an operational server in the same cluster. Virtualization (covered in chapter 5) can also increase availability of servers by reducing unplanned downtime.
Server redundancies.
(Availability):
If a site can no longer function due to a disaster, such as a fire, flood, hurricane, or earthquake,
the site can move functionality to an alternate site. The alternate site can be a hot site (ready and available 24/7), a cold site (a location where equipment, data, and personnel can be moved to when needed), or a warm site (somewhere in the middle of a hot site and cold site).
Site redundancies.