Chapter 1: Security Principles Flashcards
Understanding and prioritizing risks, using governance and elements to lead and organize the cybersecurity operation
Risk Management
Secret of information with asset being protected
Confidentiality
Provide confidentiality
Access Controls
Another method of confidentiality that makes data unreadable except to authorized persons
Cryptography
Ensures data is not changed by unauthorized users. Hashes are used for protection.
Integrity
Attacks known as DoS Attacks
Availability
Make sure a website is able to operate for their customers
Availability
Something you know (password)
Type 1 Verification
Something you have (smart card)
Type 2 Verfiication
Something you are (biometric fingerprint)
Type 3 Verification
Refers to the measure of the information security, verifies the (CIA) of data and assets
Information Assurance
Gather as much information as possible to carry out attack
Conduct Research (Cyberattack Step 1)
Identify organization’s info assets and vulnerabilities that can be exploited
Identity Targets (Cyberattack Step 2)
Attacker designs and executes the attack while gaining unauthorized access to the enterprise
Exploit Targets (Cyberattack Step 3)
Gain deeper access and attack more, resulting in stealing personal info and credit card data
Do Bad Things (Cyberattack Step 4)
Compromise of confidentiality
Stealing Data
Compromise of integrity
Modifying Data
Compromise of availability
Destroying data/disrupting environment
First step an organization will take to understand threats, discipline of how an organization chooses & implements the right level of security protecting the organization.
In business environment, they protect assets and threats from occurring in a risk management process, deciding on how much to spend on security based on tolerance for risk
Risk Management
Where setting up improper file permissions/configure admin accounts w/default passwords
Misconfigured Devices
One of the weakest links in cybersecurity
Human vulnerabilities
Potentially damaging event with exploitation of a vulnerability
Threat