Fundamentals of Security Flashcards
Information Security
Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction
Information Systems Security
Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data
Confidentiality
Ensures information is accessible only to authorized personnel (e.g.,
encryption)
Integrity
Ensures data remains accurate and unaltered (e.g., checksums)
Availability
Ensures information and resources are accessible when needed (e.g.,
redundancy measures)
Non-Repudiation
Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)
CIANA Pentagon
An extension of the CIA triad with the addition of non-repudiation and
authentication
Triple A’s of Security
Authentication, Authorization, Accounting
Security Control Categories
■ Technical
■ Managerial
■ Operational
■ Physical
Security Control Types
■ Preventative
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive
Zero Trust Model
Operates on the principle that no one should be trusted by default
To achieve zero trust, we use what two PLANES?
■ Control Plan
■ Data Plane
Control Plane
Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones
Data Plane
Subject/system, policy engine, policy administrator, and
establishing policy enforcement points
Threat
Anything that could cause harm, loss, damage, or compromise to our information
technology systems
■ Disasters
■ Cyber attacks
■ Security breaches
Vulnerability
Any weakness in the system design or implementation that is INTERNAL
■ Missing security patches
■ Bugs
■ Physical security
Risk Management
Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome
Confidentiality
■ Information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes
3 main reasons why confidentiality is important
■ To protect personal privacy
■ To maintain a business advantage
■ To achieve regulatory compliance
What are the five basic methods to ensure confidentiality?
■ Encryption
■ Access Controls
■ Data Masking
■ Physical Security Measures
■ Training and Awareness
Encryption
Process of converting data into a code to prevent unauthorized access
Access Controls
By setting up strong user permissions, you ensure that only authorized
personnel can access certain types data
Data Masking
Method that involves obscuring specific data within a database to make it
inaccessible for unauthorized users while retaining the real data’s
authenticity and use for authorized users
Physical Security Measures
Ensure confidentiality for both physical types of data, such as paper
records stored in a filing cabinet, and for digital information contained on
servers and workstations
Training and Awareness
Conduct regular training on the security awareness best practices that
employees can use to protect their organization’s sensitive data
Integrity
Helps ensure that information and data remain accurate and unchanged from its
original state unless intentionally modified by an authorized individual
What are the three main reasons why Integrity is important?
■ To ensure data accuracy
■ To maintain trust
■ To ensure system operability