Chapter 1 Concepts Flashcards
To understand concepts covered in Security+ book
Confidentiality
Confidentiality ensures that data is only viewable by authorized users. The best way to protect the confidentiality of data is to encrypt it
Steganography
Steganography is the process of hiding data within data. Such as hiding a text document within an image file
Integrity
Integrity provides assurances that data has not changed. This includes ensuring that data has not been modified, tampered with, or corrupted. Loss of integrity indicates the data is different.
Availability
Availability indicates that data and services are available when needed. Organizations commonly implement redundancy and fault-tolerance to ensure high levels of availability.
Redundancy
Redundancy adds duplication to critical systems and provides fault tolerance. If a critical component has a fault, the duplication provided by the redundancy allows the service to continue without interruption.
Fault Tolerance
A goal of fault tolerance is to remove each single point of failure. A system with fault tolerance can suffer a fault but it can tolerate it and continue to operate.
Risk
Risk is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.
Threat
A threat is any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.
Vulnerability
A vulnerability is a weakness in hardware, software, configuration, or even users.
Security Incident
A security incident is an adverse event or series of events that can negatively affect the confidentiality, integrity, or availability of an organization’s IT systems and data. This includes intentional attacks, malicious software (malware) infections, accidental data loss, and much more.
Risk Mitigation
Risk mitigation reduces the chances that a threat will exploit a vulnerability, or reduces the impact of the risk, by implementing security controls.
Security Controls
Security controls are used to mitigate risk and include technical, administrative, physical, preventive, detective, corrective, deterrent, and compensating.
Technical Controls
Technical controls use technology to reduce vulnerabilities. Some examples include encryption, anti-virus software, and firewalls.
Administrative Controls
Administrative controls use methods mandated by organizational policies or other guidelines. These include awareness and training, configuration and change management, and contingency planning.
Physical Controls
Physical controls are controls that you can physically touch. Some examples include lighting, signs, fences, and security guards.