Cyber Security Flashcards
is the practice of protecting systems, networks, and programs from digital attacks. These attacks typically include business interruptions or the theft, tampering, or destruction of sensitive information.
Cybersecurity
Pillars of Cyber Security
Policies & Procedures
Products & Services
Best Practices
is now a combination of best practices, policies, and procedures along with various security products and services. All these concepts work together to make up the modern day cybersecurity stack.
Cybersecurity
CIA Triad
Confidentiality
Integrity
Availability
Data is protected against unauthorized changes
Integrity
Data is protected from unauthorized access
Confidentiality
Authorized data access whenever you need it
Availability
A model designed to guide policies for information security within an organization
CIA Triad
is kept secret to prevent: identity theft, compromised accounts and systems, legal concerns, damage to reputation, and other severe consequences.
Confidential information
To determine if data should be confidential, ask:
Who is authorized?
Do confidentiality regulations apply?
Are there conditions for when data can be accessed?
What would the impact of disclosure be?
Is the data valuable?
are always after sensitive information or personal data.
Cybercriminals
To keep confidential data secure, control data access and use security tools like
encryption and multifactor authentication (MFA)
is one of the most valuable assets a company can have, but it is NOT STATIC. It can be transferred to other systems, altered, and updated multiple times.
Data
guarantees that data is accurate, complete, and consistent.
Data integrity
It covers data in storage, during processing, and in transit
Integrity
Without this, loss, corruption, or compromise can cause significant damage and financial loss for both businesses and customers.
Data Integrity
2 Main Types of Integrity
Physical Data Integrity
Logical Data Integrity
are the checks and protocols that protect data from human error and hackers. These confirm that data is correct and accurate as it’s used in different ways within an organization
Logical data integrity
is the collection of actions and fail-safes that protect the physical systems that store and process the data.
Physical data integrity
means that authorized users have immediate and reliable access to their data. This includes granting access to authorized users with passwords and security questions.
Data availability
Some of the most fundamental threats to availability are
non-malicious, including hardware failures, unscheduled software downtime, and network bandwidth issues.
DoS
Denial of Service
NIST Cybersecurity Framework
Identify
Protect
Detect
Respond
Recover
What processes and assets need protection?
Identify