Domain 1 - Security Principles Flashcards
What is Information Security?
Secures everything.. Paper, documents voice, etc…
What is IT security?
All hardware software, being processed, stored and communicated.
What is Cyber Security?
Is everything from IT security that is accessible from the internet
What does the CIA triad stand for?
Confidentiality, Availability, and Integrity
What is confidentiality mean?
That there is no unauthorized access to the data.
What are the three states of data?
Data:
At rest
In motion
In use
What does Integrity mean?
We ensure the data has not been altered.
What does availability mean?
Ensuring authorized people can access the data they need.
What does DAD stand for?
Disclosure, Alteration, and Destruction . It is the opposite of the CIA triad.
What does the IAAA acronym stand for?
Identification
Authentication
Authorization
Accountability
What is an Identification?
Something that identifies you. Username, SSN, employee number.
What is an example of Type 1 Authentication? Also known as knowledge factors.
Something you know
Your pin number for the ATM
your password or passphrase
What is an example of Type 2 Authentication? Also known as possession factors.
ID
passport
token
smart code
MFA device
What is an example of Type 3 Authentication? Also known as realistic or biometric factors.
It is something you are
Iris scan
facial geometry
fingerprint
What are physiological characteristics?
Uses the shape of the body for type 3 authentication.
What are behavioral characteristics?
Uses the pattern of behavior of the person for type 3 athentication.
What is Authorization?
It is he process of assigning access to systems after a user has authenticated
What is DAC (Discretionary Access Control)?
It’s when access to an object is assigned at the discretion of the object owner.
Commonly used when availability is most important.
What is MAC (Mandatory Access Control?
Labels are assigned to objects and subjects (users) have clearance assigned to them to be able to see the objects.
commonly used when confidentiality is the most important
What is RBAC?
Role based access control. Access is based on a role.
What is ABAC (Attribute Based Access Control)?
Access to objects is based on subjects, objects, and environmental conditions.
What is context-based access control?
Access is provided to an object and is based on contextual parameters such as location, time, access history, etc..
What is content based access control?
Access is provided on the attributes or content of an object. Think different data on the same website depending on who you are.
What is accountability?
Tracing an action to a subject’s identity.
What are subjects?
Users or applications
What are objects?
Any data
What is the formula for risk?
Threat * Vulnerability * Impact