Domain 1: Security Principles Flashcards
What is Information Security
Protecting paper documents, voice information, data, and the knowledge people have
What is IT Security
Protecting hardware, software, and data (computers, servers, networks, firmware, data being processed, stored, and communicated
What is Cyber Security
Everything from IT security that is accessible from the internet
What does CIA stand for
Confidentiality, Integrity, Availability
What is Confidentiality
Keeping our data and systems safe by ensuring no one unauthorised can access it
What is Integrity
Protecting data and systems against modification by making sure the data has not been altered
What is Availability
Ensuring authorised people can access they data they need when they need to
What do we use to ensure Confidentiality
Disk Encryption, secure transport encryption, clean desk policies, no shoulder surfing, screen locks, strong passwords, mfa, access control, need-to-know, least privilege
What threatens Confidentiality
attacks on encryption, social engineering, key loggers, cameras, backdoors in IOT devices
What do we use to ensure Integrity
Cryptography, check sums, message digests/hash (md5, sha1, or sha2), digital signatures, access control, non-repudiation
What threatens Integrity
alterations of data, code injections, attacks on encryption
What do we use to ensure Integrity
IPS/IDS, patch management, redundancy in power (ups/generator), disks (RAID), traffic paths (network design), HVAC, staff, high availability design, replication of data
What threatens availability
malicious attacks (DDOS, physical, system compromise, staff), application failures, component failure (hardware)
What is the opposite of CIA
DAD - Discolsure (opposite of confidentiality): someone not authroised getting access
Alteration (oppostive of integrity): data has been changed without authorisation
Destruction (opposite of availability): your data or system are not accessible or destroyed
What is IAAA
Identification, authentication, authorisation, accountability
what is identification
your username, id number, employee number
what is authentication and what are the types
proving you are an identity
type 1: something you know - passwords, pass phrase, pin
Type 2: something you have - ID, passport, smart card, token, cookie, phone
Type 3: something you are - biometrics, finger print, iris scan, palm vein scan, facial geometry
What are the minimum password requirements
specify minmum length, upper and lower case,, numbers, symbols, not contain usernames or easy to guess words or phrases, expiration date, not reused, limit reuse via policy
What is key stretching
adding a few seconds to password verification to make brute force an unfeasible attack