Fundamentals Of Security Flashcards
Information Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Information Systems Security
Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data
CIA Triad
- Confidentiality (authorized personnel only)
- Integrity - accurate and unaltered
- Availability - info and resources available as needed
CIANA Pentagon
Extension of CIA triad with addition of non-repudiation and authentication
Triple A’s of Security
- Authentication - verifying ID of a user or system
- Authorization- determine actions/ resources a user has access to
- Accounting - track user activities and resource usage for audit/billing
6 Security Control Types
- preventative - proactive measures
- deterrent - discourage attackers by making effort seem less appealing/more challenging
- detective - monitor and alert organizations to malicious activity as they occur or shortly after
- corrective - mitigate any potential damage and restore systems to their normal state
- compensating - alternative measures that are implemented when primary security controls, not feasible or effective
- directive - guide, inform, or mandate actions; often routed in policy or documentation; set the standards for behavior within an organization
Zero Trust Model
Principle that no one should be trusted by default; to achieve we use the control plane and the data plane
Control plane
The overarching framework and set of components, responsible for defining, managing and reinforcing the policies related to user and system access within an organization
Adaptive identity - relies on real time validation that takes into account the user behavior, device location and more
Threat scope reduction - limits the users access to only what they need for their work task, because this reduces network potential attack surface
- focused on minimizing the “blast radius” that could occur in the event of a breach
Policy-driven access control - developing managing and enforcing user access policies based on their roles and responsibilities
Secured zones - isolated environments within a network that are designed to house sensitive data
Data plane
Ensures the policies are properly executed
Subject/system - the individual entity attempting to gain access
Policy engine - cross references the access request with its predefined policies
Policy administrator - used to establish and manage the access policies
Policy enforcement points - where the decision to grant or deny access is actually executed
Threat
Anything that could cause harm, loss, damage, or compromise to our information technology systems
Examples:
- Natural disasters
-Cyber attacks
- Data integrity breaches
- Disclosure of confidential information
Vulnerability
Any weakness in the system design or implementation
Examples:
- software bugs
- misconfigured software
- improperly protected network devices
- missing security patches
-lack of physical security
Risk management
Finding different ways to minimize the likelihood of an outcome and achieve the desireed outcome
Confidentiality - Encryption
Refers to the protection of information from unauthorized access and disclosure
Important for three reasons:
1. Protect personal privacy
2. Maintain a business advantage
3. Achieve regulatory compliance
Five methods to ensure confidentiality
- Encryption - convert data to code
- Access controls - strong user permissions
- Data masking - obscuring data within a database
- Physical security
- Training and awareness - conduct training on security awareness/best practices to protect an organization’s sensitive data
Integrity - hashing
Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
Important for 3 reasons:
1. Ensure data accuracy
2. Maintain trust
3. Ensure system operability