Domain 1: Security and Risk Management Flashcards
CIA
Confidentiality, Integrity and Availability
States of Data
At rest
In process
In transit
Password Masking CIA principle
Condifentiality
Data in transit basic protection
TSL or SSL
Confidentiality overt and covert techniques
Cryptography
Masking
Steganograhy
Protection against system or software modification
Integrity
Methods to ensure integrity
CRC Checksum Message Digest Hashes MAC Input Validation!!!
Availability description
Provide timely access to a resource
Availability metrics
Tolerance for losses: MTD/RTO/RPO
Lega: SLA
Life expectancy: MTBF/MTTR
MTBF
Mean Time Between Failure: the expected lifespan of the device
MTTR
Mean Time To Repair: how much time will be required to restore de component to functionality
RPO
Recovery Point Objective: how much data can be lost after a restoration
MTD
Maximum Tolerance Downtime: how long can the component/system can be down before our lose is unacceptable.
SLA
Service Legal Agreement
IAAA
Identification
Authentication
Authorization
Accountability
FAR
False Accept Rate
FRR
False Reject Rate
Access Control Models
DAC
MAC
RBAC
RuBAC
DAC
Discretionary Access Control: Zero knowledge
MAC
Mandatory Access Control: Labels
RBAC
Role Based Access Control