Chapter 1 - Mastering Security Basics Flashcards
Use Case
Describes a goal than an organization wants to achieve
Confidentiality
Prevents the unauthorized disclosure of data. Authorized personnel can access the data, but unauthorized cannot.
Encryption
Scrambles data to make it unreadable by unauthorized personnel. Authorized personnel can decrypt the data to access it.
Identification
Claiming identity with unique username
Authentication
Prove identity with authentication, such as a password
Authorization
Granting or restricting access to resources
Stenography
Hiding data within data. Obscures the data and can be used in a use case to support obfuscation. Referred to as hiding data in plain sight. Example is embedding a hidden message in an image by modifying bits.
Obfuscation
Attempting to make something unclear or difficult to understand. Its called security by obscurity. Not reliable.
Best way to protect data confidentiality
Encryption
Access Controls
Help protect confidentiality by restricting access
Integrity
Provides assurances that data hasn’t changed. This means data isn’t modified, tampered with, or corrupted.
Hash
Simply a number created by executing a hashing algorithm against data, such as a file or message.
Digital Signature
Attached to file or email to assure that nothing was modified. Also provided authentication. Also provide non-repudiation (you can’t deny you digitally signed it after sending). Require digital certificates.
Availability
Indicates that data and services are available when needed.
Redundancy
Adds duplication to critical systems and provides fault tolerance
Risk
Possibility or likelihood of a threat exploiting a vulnerability resulting in a loss
Threat
Any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.
Vulnerability
A weakness in the hardware, software, the configuration, and even the users operating the system.
Security Incident
An adverse event or series of events that can negatively affect the confidentiality, integrity, or availability of an organization’s IT systems and data.
Risk Mitigation
Reduces the chances that a threat will exploit a vulnerability, by implementing security controls
Technical Controls
Use technology to reduce vulnerabilities
Principle of Least Privilege
Individuals or processes are granted only to privileges they need to perform their assigned tasks or functions, but no more.
Administrative Controls
Use methods mandated by organizational policies or other guidelines.
Risk Assessments
Help quantify and qualify risks within an organization so that the organization can focus on the serious risks.
Quantitative Risk Assessment
Uses cost and asset values to quantify risks based on monetary values
Qualitative Risk Assessment
Uses judgments to categorize risks based on probability and impact.
Vulnerability Assessment
Attempts to discover current vulnerabilities or weaknesses.
Pen Tests
Attempts to exploit vulnerabilities.
Physical Controls
Any controls that you can physically touch. Includes lighting, signs, fences, guards, and more.
Many physical controls are also technical controls, such as a fire suppression system.
Preventive Controls
Controls to prevent security incidents like hardening, security awareness & training, security guards, change management, etc