Fundamentals of Security Flashcards
Section 2
Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure and corruption and destruction.
Information Security
The data that systems hold, not the data systems themselves is an example of what?
Information Security
Act of protecting the systems that hold and process the critical data.
Information Systems Security
The actual data systems (cell phones, computers, servers) not the actual data they hold are an example of what?
Information Systems Security
What is the CIA Triad also known as the 3 pillars of security
Confidentiality
Integrity
Availability
Ensures that information is only accessible to those with appropriate authorization.
Confidentiality
What Pillar of security is this an example of. Encrypting sensitive files and authorizing specific people to de-encrypt them and read them.
Confidentiality
Ensures that data remains accurate and unaltered unless modification is required.
Integrity
What Pillar of security is this an example of. Checksums can be used to verify that a file has not been changed or corrupted as it moves along a network during a data transfer
Integrity
Ensures that information and resources are accessible and functional when needed by authorized users.
Availability
What Pillar of security is this an example of. When you implement redundancy measures for a website to ensure it remains online and up at any time regardless of how much traffic it is receiving.
Availability
What is the CIANA Pentagon
Confidentiality
Integrity
Availability
Non-Repudiation
Authentication
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.
Non-Repudiation
Sending an email that has been digitally signed that a person cannot deny sending the email is an example of what
Non-Repudiation
What are the AAA of Security
Authentication
Authorization
Accounting
Process of verifying the identity of a user or system
Authentication
Defines what actions or resources a user can access
Authorization
Act of tracking user activities and resource usage, typically for auditing or billing purposes
Accounting
This is an example of what AAA of security. When you try to login to get our email username and password is being checked against a stored version to confirm your identity.
Authentication
This is an example of what AAA of security. In a company database you as an employee you may have access to view records but you many not have access to edit them so you have read permission
Authorization
This is an example of what AAA of security. When you log into your computer what you do is being logged to be able to monitor unusual or unauthorized behavior.
Accounting
Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity and availability of information systems and data
Security Controls
What are Security Control Categories
Technical
Managerial
Operational
Physical
What are Security Control Types
Preventative
Deterrent
Detective
Corrective
Compensation
Directive
Security model that operates on the principle that no one whether inside or outside the organization should be trusted be default.
Zero Trust
Verification required for everybody is an example of what.
Zero Trust
Consists of the adaptive identity, threat scope reduction, policy-driven access control and secured zones.
Control Plane
Focused of the subject/system, policy engine, policy administrator, and establishing policy enforcement points.
Data Plane
Anything that could cause harm, loss, damage or compromise to information technology systems.
Threat
External Source Threats are threats we cannot fully control. Name four types
Natural Disasters
Cyber Attacks
Data integrity breaches
Disclosure of confidential infomration
Any weakness in the system design or implementation
Vulnerability
Internal factors are threats we can control and prevent name 5 examples
Softeware bugs
Misconfigured software
Improperly protected network devices
Missing security patches
Lack of physical security
Finding different ways to minimize the likely hood of an outcome occurring and achieving the desired outcomes
Risk Management
This is an example of what Threat, Vulnerability or Risk Management.
You are trying to get to work on time but you remember you have to stop and get gas causing you to be late.
Vulnerability - Getting gas is something that could have been done the night before. Vulnerabilities can be prevented
This is an example of what Threat, Vulnerability or Risk Management.
You are trying to get to work on time but a there is a car accident on the high way you are now stuck in traffic causing you to be late.
Threat - You could not have prevented the other driver to not cause a car accident
This is an example of what Threat, Vulnerability or Risk Management.
You are trying to get to work on time you feel rushed so you decide to leave an extra 30 minutes early.
Risk Management - You are giving yourself extra time incase any vulnerabilities or threats pop up on your way to work
Refers to the process of information from unauthorized access and disclosure
Confidentiality
This is an example of what CIA. Sensitive data is only to be seen by authorized people
Confidentiality