Chapter 3 Module 1 Flashcards
Security Control
A control is a safeguard or countermeasure designed to preserve Confidentiality, Integrity and Availability of data. ( CIA Triad)
Access Control
Access Control involves limiting what objects can be available to what subjects according to what rules.
Firewall
An example of Security Access Control, is included in a system or network to prevent something from
The outside from coming in and disturbing or compromising the environment.
Subject
Can be defined as an entity that requests access to our assets.
A subject
Is a user, a process, a procedure, a client ( or a server), a program, a device such as an endpoint, workstation, smartphone or removable storage device with onboard firmware.
Object
Anything that a subject attempts to access.
An object:
Is a building, a computer, a file, a database, a printer or scanner, a server , a communications resource, a block of memory, an input/output port, a person, a software task, thread or process.
Access Rule
Is an instruction developed to allow or deny access to an object by comparing the validated identity of the subject to an access control list.
Firewall
Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules.
Layered Defense
The use of multiple controls arranged in series to provide several consecutive controls to protect an asset;
Defense in depth
Describes an information security strategy that integrates people, technology and operations capabilities to establish variable barriers across multiple layers and missions of the organization.
The Principle of Least Privilege
The principle that users and programs should have only the minimum privileges necessary to complete their tasks.
Privileged access management
Is based on the principle of least privilege, meaning each user is granted access only to the items they need and nothing further.
Ransomware
A type of malicious software that locks the computer screen or files, thus preventing or limiting a user from accessing their system and data until money is paid.
User provisioning
The process of creating, maintaining and deactivating user identities on a system.