Chapter 1 Flashcards
CIA Triad
- Confidentiality=prevents the unauthorized disclosure of information. It keeps secret information secret.
- Integrity=prevents the unauthorized alteration off of information or systems. It keeps our safe from intentional or accidental changes.
3.Availability=ensures authorized users are able to access information and systems when they need them.
Encryption
Encryption scrambles data to make it unreadable by unauthorized personnel. Authorized personnel can decrypt the data to access it, but encryption techniques make it extremely difficult for unauthorized personnel to access encrypted data.
AES
Advanced Encryption Standard
PII
Personally Identifiable Information
Access Controls
Identification, authentication, and authorization are the three core identity and access management activities that help ensure that only authorized personnel can access data.
Identification. Users claim an identity with a unique username.
Authentication. Users prove their identity with authentication, such as with a password.
Authorization. Next, you can grant or restrict access to resources using an authorization method, such as permissions.
Remember. Confidentiality ensures that data is only viewable by authorized users. The best way to protect the confidentiality of data is by encrypting it. This includes any type of data, such as PII, data in databases, and data on mobile devices. Access controls help protect confidentiality by restricting access.
SHA
Secure Hash Algorithm
md5sum.exe
You can use freeware such as md5sum.exe to calculate MD5 hashes.
SPOF
single point of failure A common goal of fault tolerance and redundancy techniques is to remove each single point of failure (SPOF)
Disk redundancies.
Fault-tolerant disks, such as RAID-1 (mirroring), RAID-5 (striping with parity), and RAID-10 (striping with a mirror), allow a system to continue to operate even if a disk fails.
Server redundancies
Failover clusters include redundant servers and ensure a service will continue to operate, even if a server fails. In a failover cluster,the service switches from the failed server in a cluster to a redundant or standby server in the same cluster.
Network redundancies.
Load balancing uses multiple servers to support a single service, such as a high-volume website. Network interface card (NIC) teaming can provide both redundancy support and increased bandwidth by putting two or more network cards in a single server.
horizontal scaling
Adding additional servers
Vertical scaling
Vertical scaling doesn’t add more servers, but instead adds resources, such as memory or processing power, to individual servers. For example, a server may have 16 GB of random-access memory (RAM) installed. Administrators can scale the system up by manually adding an additional 16 GB of RAM, giving it 32 GB. However, there is typically a limit to scalability based on the system. For example, a server may only support 32 GB of RAM. Once it has 32 GB of RAM, you can no longer scale up the RAM.
Elasticity
Elasticity automates scalability by having the system add and remove resources as needed.
TCO
Total cost of ownership
TCP
Transmission Control Protocol
Resiliency
A current trend is to increase the resiliency of systems rather than seek the highest possible availability. This ensures that systems are reliable but without the high cost associated with highly available systems. (such as an uninterruptible power supply or generators), network interface card (NIC) teaming, or redundant disks. If power fails, or one of the NICs stops receiving traffic, or one of the disk drives fails, the system can quickly recover.
Risk
Risk is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.
threat
A threat is any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.
vulnerability
A vulnerability is a weakness. It can be a weakness in the software, the configuration, or even the users operating the system.
security incident
A security incident is an adverse event or series of events that can negatively affect the confidentiality, integrity, or availability of an organization’s information technology (IT) systems and data.This includes intentional attacks, malicious software (malware) infections, accidental data loss, and much more.
Risk mitigation
reduces the chances that a threat will exploit a vulnerability or the impact that the risk will have on the organization if it does occur. You reduce risks by implementing controls (also called countermeasures and safe measures.
Technical controls
TYPE OF Security Controls. use technology such as hardware, software, and firmware to reduce risk.
Managerial controls
TYPE OF Security Control. are primarily administrative in function. They are typically documented in an organization’s security policy and focus on managing risk.