Fundamental of Security Flashcards
Security
CIA TRIAD
Confidentiality
Integrity
Avaliablity
Non-Repudation
Guaranteeing that a specific acation or reven has taken place and cannot be denied
AAA Security
Authentication
Authorization
Accounting-Tracking
Zero Trust
Should be trusted without correct crendintals
Control Plane
Threat scope reduction
Data plane
Subject/System
Confidentiality
Protection of info from unauthorized personal.
Encryption
Turning data into code to prevent unauthorized access
Access Controls
Ensure only authorized personall can access some type’s of data.
Data Masking
Obscuring data within database. Masking a credit card number besides the last four.
Physical Security Measures
Ensures confidentiality for physical aspect of things.
Training and awareness
Conducting regular training basically like an all hands to help employees.
Integrity
Helps data reamin accurate unless changed by someone else. Showing who is who.
Hashing
Process of converting data to a fized value
Digital Signtture
Use encryption to ensure integrity and authenticity just like the CAC card or permissons of saying who is changing this.
CheckSums
Verify the integrity during transmission.
Access Controls
Ensuring that only authorized individuals can mod data.
Regular Audits
Revewings lows and operations to make sure if anything has changed.
Availability
Making sure services are available when they suppose to be.
Redundancy
Backup options in case systems fail.
Server Redundancy
Using multiple servers in a load balance. If one fails you have other servers to support.
Data Redundancy
Storing data in multiple places. Raids or hybrids
Network Redundancy
Traffic can travel still through another route.
Power Redundancy
Genertors and etc that provide power.
Non-Repuditation/Digital Signatures
Undeniable proof of digital transactions.
Authentication
Ensures individuals who they are. Focus on the Identity in a digital interaction.
Authorization/Gate Keeper
Permissions and privileges granted to users.
Set of rules and actions.
Accounting
Ensures all user activities are tracked and recorded.
Audit Trail
Chronloligcal record of all user activities
Regulatory Complance
maintains record of all user activity
Forensic Analysis
Detailed accounting and even logs help cybersec users.
Resource Optimization
Can optimize systems and minimize cost.S
Syslog servers
Used to aggregate logs from various network devices
Network Analyzers. Ex WireShark
Use to capture and analyze network traffic to gain detailed insights on all data moving within a network.
Security Control Cateogries:
1.Technical Controls
2.Managerial Controls
3.Operational Controls
4.Physical Controls
1.Tech and hardware and software are implemented to manage and reduce risk(Ex. AntiVirus,Firewalls, encryption processes).
2.Strategic planning and governance.(Ex. Admin Stuff, risk assessments, security policies etc)
3. Protect data day to day. Changing your password every 90 days or back up procedires.
4. Real world measures that are not digital.Cameras doors etc.
Security Info and even managment
Real time analysis of security alerts.
Preventative Controls
Proactive measures to thwart potential security threats like a firewall.
Deterrent Controls
Discourage potential attackers makeing the effort more challenging. Like a burglar systems and ads in the house like the ADT grass stamp.(Warning Signs).
Detective Contriols
Monitor and alerts orgs to malicious activities. Focus on detection and modification.(IDS- Intrusion detection system)
Corrective Controls
Mitigating any damage and restoring systems. Like an antivirus that quirtines the malwate
Compensating Controls
Alternative measures when primary security controls are not effective. Using a back up security type vibe.
Directive Controls
Directive controls are policies or procedures that dictate specific actions or behaviors by users or systems.
Control Plane
Framework and set of componets responsible for defining managing. What where when etc.
Policy-Driven Access Control
Developing,managing and enforcing user access into there role.
Adaptive Identity
Rely on real time validation. Account the user behavior
Threat scope reduction
Limit userr access to only what they need for work
Secured Zones
Isolated environments within the network designed to house sensitive data.
Policy Engine
Cross references the access request like a rule book.
Subject/System
Refers to the indiviual or entity attempting to gain access.
Policy Enforcement point
Allow or restrict the access.
Gap Analysis
Process of evaluating current performance and where they want to be and looking at what needs to be approved.
Technical Gap Analysis
Evaluating an or current tech infrastructure. Finding gaps they need to make there technical aspect stronger.
Business Gap Analysis
evaluating an org current business processes. Finding areas where they fall short for cost and etc.
Plan of action and Milestones(POA&M)
Outlining specific measuers to address each vulnerability allocate resources and set up times likes for task that need to be done.