Fundamentals of Security Flashcards
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Information Security
Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data
Information Systems Security
CIA Triad
Confidentiality, Integrity, Availability
Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures
Non-Repudiation
CIANA Pentagon
An extension of the CIA triad with the addition of non-repudiation and
authentication
AAA of Secuirty
Authentication, Authorization, and Accounting
Security Control Categories
Technical
Managerial
Operational
Physical
Security Control Types
Preventative
Deterrent
Detective
Corrective
Compensating
Directive
Operates on the principle that no one should be trusted by default.
To achieve zero trust, we use the control plane and the data plane
Zero Trust Model
Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones
Control Plane
Subject/system, policy engine, policy administrator, and
establishing policy enforcement points
Data Plane
Process of evaluating the differences between an organization’s current
performance and its desired performance
Gap Analysis
Conducting a gap analysis can be a valuable tool for organizations looking to improve
their…
operations, processes, performance, or overall security posture
2 Types of Gap Analysis
Tehcnical Gap Analysis
Business Gap Anaalysis
Outlines the specific measures to address each vulnerability, Allocate resources,
Set up timelines for each remediation task that is needed
Plan of Action and Milestones (POA&M)
demands verification for every device, user, and transaction within the
network, regardless of its origin
Zero Trust
Relies on real-time validation that takes into account the
user’s behavior, device, location, and more
Adaptive Identity
Limits the users’ access to only what they need for their
work tasks because this reduces the network’s potential
attack surface.
Focused on minimizing the “blast radius” that could occur
in the event of a breach
Threat Scope Reduction
Entails developing, managing, and enforcing user access
policies based on their roles and responsibilities
Polivy-Driven Access Control
Isolated environments within a network that are designed
to house sensitive data
Secured Zones
Guide, inform, or mandate actions
Often rooted in policy or documentation and set the standards for behavior within an organization
Directive Controls
Alternative measures that are implemented when primary security
controls are not feasible or effective
Compensating Controls
Mitigate any potential damage and restore our systems to their normal
state
Corrective Controls
Monitor and alert organizations to malicious activities as they occur or shortly thereafter
Detective Controls
Discourage potential attackers by making the effort seem less appealing
or more challenging
Deterrent Controls
Proactive measures implemented to thwart potential security threats or
breaches
Preventative Controls
Refers to the individual or entity attempting to gain access
Subject/System
Cross-references the access request with its predefined
policies
Policy Engine
Used to establish and manage the access policies
Policy Administrator
Where the decision to grant or deny access is actually
execute
Policy Enforcement Point