Fundamental Security Flashcards
What is Information Security?
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.
What is the Information Systems Security
Protecting the systems (ex. computers, servers, network devices) that hold and process critical data
What does CIA stand for?
Confidentiality, Integrity, Availability
Confidentiality
Ensures information is accessible only to authorized personnel (ex. encryption)
Integrity
Ensures data remains accurate and unaltered (ex. checksums)
Availablity
Ensures information and resources are accessible when needed (Ex. redundancy measures)
Non-Repudiation
Guarantees that an action or event cannot be denied by the involved parties (ex. digital signatures)
CIANA Pentagon
Extension of CIA triad, but with non-repudation and authentication
Triple A’s of Security
Authentication, Authorization, Accounting
Security Control Categories
Technical, Managerial, Operational, and Physical
Security Control Types
Preventative, Deterrent, Detective, Corrective, Compensating, Directive
Zero Trust Model
Operates on the principle that no one should be trusted by default
How do we achieve zero trust?
Through the Control Plane & the Data Plane
Data Plane
Subject/system, policy engine, policy administrator, and establishing policy enforcement points
Control Plane
Adaptative Identity, threat scope reduction, policy-driven access control, and secured zone