Ch1 Flashcards
Confidentiality ensures…
Data is only viewable by authorized users. Best way to protect confidentiality of data is by encrypting it.
What protects confidentiality by restricting access?
Access controls
Integrity verifies…
…that data has not been modified. Hashing algorithms calculate hashes to verify integrity.
What do digital signatures do?
Verify integrity of emails/files and provide authentication and non-repudiation
Availability ensures…
…that systems are up and operational when needed and often addresses single points of failure.
Risk
The likelihood that a threat will exploit a vulnerability
Risk Mitigation
Reducing the chances that a threat will exploit a vulnerability, or reducing the impact of the risk, by implementing security controls
3 common classes of security controls
Technical, administrative, and physical
Technical controls
Use technology to reduce vulnerabilities. Examples include encryption, AV software, IDS/IPSs, and firewalls.
Preventative controls
Attempt to prevent security incidents (hardening systems, security guards, change management, account disablement).
Detective controls
Attempt to detect when vulnerabilities have been exploited (log monitoring, trend analysis, security audits, CCTV systems)
Virtualization provides…
multiple virtual servers running on 1 physical server. Provides increased availability with lower operating costs. Provides flexibility via snapshots.
A threat is…
Any circumstance or event that has the potential to compromise confidentiality, integrity, or availability (CIA)
A vulnerability is…
a weakness. (hardware, software, configuration, or users)
Uses of ping command
Check connectivity, verify name resolution. Check security posture by verifying routers, firewalls, IPSs block ICMP traffic (if configured).