Domain 1 Flashcards
What are the three main components of the CIA Triad?
Confidentiality Integrity Availability
What does confidentiality aim to prevent?
Unauthorized access to data.
How can confidentiality be ensured?
Through measures like encryption access control and data classification.
What is the focus of integrity in the CIA Triad?
Maintaining the reliability and correctness of data.
What are some examples of integrity violations?
Unauthorized alterations errors in coding and malicious modifications.
What is the goal of availability?
To ensure authorized access to objects without interruption.
What threats does availability protect against?
Denial-of-service attacks device failures and environmental issues.
What is the DAD Triad and how does it relate to the CIA Triad?
The DAD Triad represents Disclosure Alteration and Destruction highlighting security failures opposite to the goals of the CIA Triad.
What is the risk associated with overprotection?
Excessive security measures can lead to constraints on availability or other security aspects.
What does authenticity ensure?
Data originates from its claimed source verifying its integrity and preventing unauthorized alterations.
What is the purpose of nonrepudiation in security?
To prevent denial of actions or events and hold subjects accountable for their actions.
What are the elements of AAA services in security?
Identification Authentication Authorization and Accounting Auditing
What does encryption achieve in security?
Hiding the meaning or intent of communication from unintended recipients.
What are security boundaries and why are they important?
Lines between areas with different security requirements crucial for controlling the flow of information and deploying appropriate security mechanisms.
What is the key principle behind defense in depth?
Using multiple security controls in a series to protect against various threats.
What is abstraction in security?
Grouping similar elements and assigning security controls collectively for efficiency.
How does data hiding contribute to security?
It prevents unauthorized access to data by positioning it in a compartment not accessible to unauthorized subjects.
What is security governance?
Practices related to supporting, evaluating, defining, and directing security efforts within an organization.
How is security governance ideally performed within an organization?
Ideally performed by a board of directors but smaller organizations may have the CEO or CISO oversee these activities.
What is the importance of external sources in security governance?
Provide knowledge and insight against which the organization’s security processes and infrastructure are compared.
What are some factors that impose governance on organizations?
Legislative and regulatory compliance needs industry guidelines or license requirements.
What is the role of documentation review in governance and third parties?
Ensures that exchanged materials meet standards and expectations before on-site inspections reducing the risk of non-compliance.