Fundamentals Flashcards
Information Security
act of protecting the data from bad actors
Information Systems Security
act of protecting the SYSTEM that holds the data
C.I.A.N.A
Confidentiality Integrity Availability Non-repudiation A.A.A
A.A.A
Authentication Authorization Accounting
C.I.A.N.A Confidentiality
ensures that information is only accessible to those with proper authorization
C.I.A.N.A Integrity
ensures that data remoins unaltered during transit
C.I.A.N.A Availability
ensures that information and resources are accessible/functional when needed
C.I.A.N.A Non-Repudiation
ensures that an action has taken place and cannot be denied by all parties involved
A.A.A Authentication
process of verifying the identity of an user and/or system
A.A.A Authorization
defines what actions or resources an user can access
A.A.A Accounting
act of tracking user activities and resource usage
Security Controls
the measures put in place to mitigate risks and protect the C.I.A.N.A
Control Plane
consists of the identity, scope reductions of threats, policy driven, and secured zones
Data Plane
focused on the system, policy engine, policy admin, and enforcement points
Threats
the ideas/actions that can harm systems; Usaually outside of your control
Vulnerabilities
the weaknesses you let in by design
PII
Personal ID Information
PHI
Personal Health Information
Ways to ensure confidentiality (5 E,D,A,P,T)
Encryption, Data Masking, Access Controls, Physical Security Measures, Training
Confidentiality =
Encryption
Confidentiality Encryption
process of converting data to code
Confidentiality Access Controls
ensure only authorized personnel can access certain types of data
Confidentiality Data Masking
obscuring data within a database so that unauthorized users cannot read it
Confidentiality Physical Security Measures
physical security