Fundamentals of Security Flashcards
Understanding Chapter 1 of security+ study material
What is information Security
Act of protecting data from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction.
What is CIANA?
Confidentiality
integrity
Availability
Non-Repudiation
Authentication
What is Information System Security
Act of protecting the systems that hold and process critical data.
What is confidentiality
Ensuring that data is only available to those with the proper authorization.
What is Integrity
Ensuring the accuracy and trustworthiness of data over it’s entire lifecycle
What is Availability
Ensuring that data and resources are accessible and functional when needed by authorized users
What is Non-Repudiation
The guarantee that a specific action or event has taken place and cannot be denied by the parties involved.
What is Authentication
The process of verifying the identity of a user or system.
What is AAA?
Authentication
Authorization
Accounting
What is Authorization?
Defining what actions or resources a user can use/perform.
What is Accounting?
Act of tracking user activities and resource usage, typically for audit or billing purposes.
What are Security Controls?
Measures or mechanisms put in place to mitigate risks and protect the Confidentiality, Integrity, and Availability of information systems and data.
What is Zero Trust?
Security model that operates on the idea of trust no one and verify everything
What are the components of Zero Trust?
Control Plane and Data Plane
What is a Control Plane?
Responsible for making decisions about how data should be forwarded within a network
What is a Data Plane?
Responsible for the actual forwarding of data packets based on the decisions made by the control plane
What is a Threat?
Anything that could cause harm, loss damage, or compromise to information technology systems.
What is a Vulnerability
Any weakness in the system design or implementation.
What is the difference between a Threat and a Vulnerability?
Threats we can’t control but can mitigate damage. Vulnerabilities are internal things we can control
What are ways to ensure confidentiality?
Encryption
Access Controls
Data Masking
Physical Security Measures
Training and Awareness
What are ways to ensure integrity?
Hashing
Digital Signatures
Checksums
Access Controls
Regular Audits
What is redundancy?
Duplication of critical components or functions of a system with the intention of improving reliability.
What are 4 types of redundancy?
Server
Data
Network
Power
What is server redundancy?
using multiple servers in a load balance so that if one is overloaded or fails, the other servers can take over the load to continue supporting end users.
What is Data Redundancy?
Involves storing data in multiple places as backups.
What is Network Redundancy?
Ensures that if one network path fails, the data can travel another route
What is Power Redundancy?
Involves using backup power sources like generators to ensure that an org’s systems remain operational during periods of power disruptions or outages within local service areas.
What are the 5 factors of providing authentication?
Knowledge/Something you know
Possession/Something you have
Inherence/Something you are
Action/Something you do
Location/Somewhere you are
What makes a robust accounting system?
Audit Trail
Regulatory Compliance
Forensic Analysis
Resource Optimization
User Accountability
What is SIEM?
Security Information and Event Management Systems.
Provide real-time analysis of security alerts generated by various hardware and software infrastructures in an organization
What are the 4 security control categories?
Technical
Managerial
Operational
Physical
What is Technical Control?
The tech, hardware, and software mechanism that are implemented to manage and reduce risk. Think anti-virus software, firewalls, encryption processes.
What is Managerial Control?
Involve the strategic planning and governance side of security. The typically the business side of an org that performs the risk assessment for a new product into the company ecosystem
What is Operational Control?
Procedures and measures that are designed to protect data on a day-to-day basis and are mainly governed by internal processes and human actions.
What is Physical Control?
Tangible, real-world measures used to protect assets
What are the 6 basic Security Control Types?
Preventative
Deterrent
Detective
Corrective
Compensating
Directive
What is a Gap Analysis?
Process of evaluating the differences between an organization’s current performance and its desired performance
What are the 2 types of Gap Analysis?
Technical and Business
What is a Technical Gap Analysis?
Looks at the technology currently used, and assesses the pros of cons of it in relation to where we ultimately want to go.
What is a Business Gap Analysis?
Looks at the current business processes, and assesses areas where we’ll fall short in utilizing the solution we want to get to.
How do we create a Gap Analysis?
- Define the Scope of Analysis.
- Gather data on the current state of the org
- Analyze the data to identify gaps
- Develop a plan to bridge the gaps.
Adaptive Identity
The process of tailoring each customer authentication to the specifics of the request
Threat Scope Reduction
Limit the user’s access to only what they need for their work tasks because it reduces the network’s potential attack surface(how much damage can occur if this particular user was compromised. )
Policy-driven Access Control
Entails developing, managing, and enforcing user access polices based on their roles and responsibilities.
Secured Zones
Isolating envs within a network that are designed to house data