Domain 1 Flashcards
Ccvv
Example: Using a username and password to log into a system.
Authorization
Definition: Determines what actions or resources a user is allowed to access after
authentication.
Example: A manager has access to employee records, but an intern does not.
Accounting
Definition: Tracks and records user activities for auditing and monitoring.
Example: Logs showing when users log in and what resources they access.
Confidentiality
Definition: Ensures that data is only accessible to authorized individuals.
Example: Encrypting sensitive emails to prevent unauthorized access.
Integrity
Definition: Ensures that data remains accurate, consistent, and unaltered unless authorized.
Example: Using SHA-256 to verify the integrity of a file after downloading.
Availability
Domain 1: Glossary of Terms 1Definition: Ensures that resources and systems are accessible
when needed by authorized users.
Example: A website with redundant servers to prevent downtime during high traffic.
Zero Trust
Definition: A security model that assumes no trust by default and requires continuous
verification.
Example: Implementing MFA and network segmentation for all users.
Symmetric Encryption
Definition: Uses the same key for encryption and decryption.
Example: AES (Advanced Encryption Standard) for encrypting database files.
Asymmetric Encryption
Definition: Uses a pair of public and private keys for encryption and decryption.
Example: RSA is used for secure key exchanges during HTTPS connections.
Hashing
Definition: Converts data into a fixed-length hash value to ensure integrity.
Example: Verifying software integrity using a SHA-256 checksum.
Public Key Infrastructure (PKI)
Definition: A framework for managing digital certificates and public keys.
Example: A website uses a digital certificate to secure HTTPS traffic.
Intrusion Detection System (IDS)
Definition: Monitors network traffic for suspicious activities and alerts administrators.
Example: Detecting a brute-force attack on a login page.
Intrusion Prevention System (IPS)
Definition: Monitors and actively blocks identified threats in real time.