Domain 1 - Security Principles Flashcards
What is the difference between IT security and Cybersecurity?
Cyber security has to do with assets that have internet access.
What does the CIA in CIA Triad stand for?
Confidentiality, Availability, Integrity
Should IOT devices be on the same network as confidential systems?
No. IOT devices are usually created for functionality, not security. Keep them separate when possible.
What are the three states of data?
Data at rest, data in transit (motion), data in use
What is Data Integrity?
Ensuring data has not been altered
What is the opposite of the CIA Triad?
DAD (Disclosure, Alteration, and Destruction)
What does IAAA stand for?
Identification, Authentication, Authorization, and Accountability
What is an “Identification” ?
Something that identifies you,. Username, ID Number, SSN, etc..
What is type 1 authentication?
A password, pass phrase, pin number. Something you remember. These are also called Knowledge Factors.
What is Type 2 authentication?
IDs, Passports, tokens, cookies… Also known as possession factors.
What is Type 3 authentication?
Fingerprints, Facial recognition, iris scans, etc.. Realistic authentication is another term for these auth types.
What does DAC stand for?
Discretionary Access Control.
When is DAC most often used?
When availability is most important.
How does DAC work?
Access to an object is assigned at the discretion of the object owner.
What does MAC stand for?
Mandatory Access Control
When is MAC most often used?
When confidentiality is the most important
What are labels assigned to when using MAC?
Objects
What are clearances assigned to when using MAC?
Subjects / People
What is RBAC?
Access by grouping
When is RBAC most often used?
When integrity is the most important
What does ABAC stand for?
Attribute based access control
How does ABAC work?
Access to objects is granted based on subjects, objects, and environmental conditions.
What is context based access control?
Access to an object is based on certain contextual parameters such as location, time, sequence of responses, and access history.
What is content based access control?
Accessed is provided based on the attributes of an objects.
What is Accountability?
Often referred to as auditing. It traces an action to a subjects identity.
What does non-repudiation mean when
It means a user cannot deny having performed a certain action.
What are “Subjects”?
These can be users, but also programs.
What are “Objects”?
Any passive data.. Physical paper and any server data