Fundamentals of Security Flashcards
What is CIA triad
Confidentiality - Ensures information is accessible only to authorized personnel
Integrity - Ensures data remains accurate and unaltered
Availability - Ensures information and resources are available when needed.
What is CIANA Pentagon
Same as CIA but add:
Non-repudiation - Guarantees that an action or event cannot be denied by the involved parties
Authentication - verifying the identity of a user or system ( e.g. password checks )
Triple A’s of Security
Authentication - verifying the identity of a user or system ( e.g. password checks )
Authorization - Determining actions or resources an authenticated user can access ( e.g. permissions)
Accounting - Tracking user activities and resource usage for audit or billing purposes
Where threats and vulnerabilities intersect:
- If you have a threat but there is no matching vulnerability to it then you have no risk
- If you have a vulnerability but there’s no threat against it, there would be no risk
Technical
Managerial
Operational
Physical, are known as:
Security Control Categories
Preventive
Deterrent
Detective
Corrective
Compensating
Directive, are known as:
Security Control Types
Control Plane - Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
Data Plane - Subject/System, policy engine, policy administrator, and establishing policy enforcement points
Zero Trust model
- Refers to the protection of information from unauthorized access and disclosure.
- Ensure that that private or sensitive information is not available or disclosed to unauthorized individuals, entities, or processes
Confidentiality
What is finding different ways to minimize the likelihood of an outcome and achieve the desired outcome?
Risk Management
3 main reasons to ensure Confidentiality
To protect personal privacy
To maintain a business advantage
To achieve regulatory compliance
5 methods to ensure confidentiality
- Encryption - Process of converting data into a code to prevent unauthorized access
- Access Controls - By setting up strong user permissions, you ensure that only
authorized personnel can access certain types of data. - Data Masking - Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users.
- Physical Security Measures - Ensure confidentiality for both physical types of data, such as paper records stored in a filing cabinet, and for digital information contained on servers and workstations.
- Training and Awareness - conduct regular training on the security awareness best practices that employees can use to protect their organizations sensitive data.
■ Helps ensure that information and data remain accurate and unchanged from its
original state unless intentionally modified by an authorized individual
■ Verifies the accuracy and trustworthiness of data over the entire lifecycle
Integrity
Integrity is important for three main reasons?
■ To ensure data accuracy
■ To maintain trust
■ To ensure system operability
5 Methods To help us maintain the integrity of our data, systems, and networks, we usually utilize are?
■ Hashing - Process of converting data into a fixed-size value
■ Digital Signatures - Ensure both integrity and authenticity
■ Checksums - Method to verify the integrity of data during transmission
■ Access Controls - Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations
■ Regular Audits - Involve systematically reviewing logs and operations to ensure that onlyauthorized changes have been made, and any discrepancies are immediately addressed.
As cybersecurity professionals, we value availability since it can help us with the
following :
■ Ensuring Business Continuity
■ Maintaining Customer Trust
■ Upholding an Organization’s Reputation