Chapter 1 Flashcards
Define Cybersecurity
the protection of information assets by addressing threats to information processed, stored and transported by internetworked information systems
Confidentiality
protection from unauthorized access
Integrity
protection from unauthorized modification
Availability
protection from disruption to access
Define APT
Advanced Persistent Threats - attacks by adveraries with sophisticated levels of expertise and resources
5 Key Functions of Protecting Digital Assets
Identify Protect Detect Respond Recover
Define Identify
Use organizational understanding to minimize risk to systems, assets, data, and capabilities.
Define Protect
Design safeguards to limit the impact of potential events on critical services and infrastructure.
Define Detect
Implement activities to identify the occurrence of a cybersecurity event.
Define Respond
Take appropriate action after learning of a security event.
Define Recover
Plan for resilience and the timely repair of compromised capabilities and services.
CIA
Confidentiality
Integrity
Availability
Method Controls for Confidentiality
Access Controls
File Permissions
Encryption
Method Controls for Integrity
Access Controls Logging Digital Signatures Hashes Encryption
Method Controls for Availability
Redundancy
Backups
Access Controls