Fundamentals of Security Flashcards
Information Systems Security
Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data
Information Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Name the 3 parts of the CIA Triad
Confidentiality, Integrity, Availability
Define Confidentiality
Ensures information is accessible only to authorized personnel (e.g.,
encryption)
Define Integrity
Ensures data remains accurate and unaltered (e.g., checksums)
Define Availability
Ensures information and resources are accessible when needed (e.g.,
redundancy measures)
Define Non-Repudiation
Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)
What is the CIANA Pentagon?
An extension of the CIA triad with the addition of non-repudiation and
authentication
What are the Triple A’s of Security?
Authentication, Authorization, Accounting
Define Authentication
Verifying the identity of a user or system (e.g., password checks)
Define Authorization
Determining actions or resources an authenticated user can access (e.g.,
permissions)
Define Accounting
Tracking user activities and resource usage for audit or billing purposes
Name the 4 Security Control Categories
■ Technical
■ Managerial
■ Operational
■ Physical
Name the 6 Security Control Types
■ Preventative
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive
What is the Zero Trust Model?
Operates on the principle that no one should be trusted by default
What 2 things do we use to achieve zero trust?
The control plane and the data plane
Control Plane
- Adaptive identity
- threat scope reduction
- policy-driven access control
- secured zones
Data Plane
- Subject/system
- policy engine
- policy administrator
- establishing policy enforcement points
What is a threat?
Anything that could cause harm, loss, damage, or compromise to our information technology systems
A threat can come from the following 4 things
● Natural disasters
● Cyber-attacks
● Data integrity breaches
● Disclosure of confidential information
What is a vulnerability?
Any weakness in the system design or implementation
A vulnerability can come from internal factors like the following
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security
Where threats and vulnerabilities intersect, that is where the risk to your enterprise systems and networks lies
■ If you have a threat, but there is no matching vulnerability to it, then you have no risk
■ The same holds true that if you have a vulnerability but there’s no threat against it, there would be no risk
What is Risk Managment?
Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome
What does Confidentiality refer to and what does it ensure?
■ Refers to the protection of information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes
Confidentiality is important for 3 main reasons
■ To protect personal privacy
■ To maintain a business advantage
■ To achieve regulatory compliance
To ensure confidentiality, we use five basic methods
- Encryption
- Access Controls
- Data Masking
- Physical Security Measures
- Training and Awareness
What is Encryption?
Process of converting data into a code to prevent unauthorized access
How are Access Controls good for Confidentiality?
By setting up strong user permissions, you ensure that only authorized personnel can access certain types data
What is Data Masking?
Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users
What are Physical Security Measures?
Ensure confidentiality for both physical types of data, such as paper records stored in a filing cabinet, and for digital information contained on servers and workstations
What is Training and Awareness?
Conduct regular training on the security awareness best practices that
employees can use to protect their organization’s sensitive data
What does Integrity help ensure and verify?
■ Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
■ Verifies the accuracy and trustworthiness of data over the entire lifecycle
Integrity is important for three main reasons
■ To ensure data accuracy
■ To maintain trust
■ To ensure system operability
To help us maintain the integrity of our data, systems, and networks, we usually utilize five methods
- Hashing
- Digital Signatures
- Checksums
- Access Controls
- Regular Audits
What is Hashing?
Process of converting data into a fixed-size value
What do digital signatures ensure?
Ensure both integrity and authenticity
What are Checksums?
Method to verify the integrity of data during transmission
Why are Access Controls good for Integrity?
Ensure that only authorized individuals can modify data and this reduces
the risk of unintentional or malicious alterations
Why are regular audits good for Integrity?
Involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed
What does Availability ensure?
Ensure that information, systems, and resources are accessible and operational when needed by authorized users
As cybersecurity professionals, we value availability since it can help us with the following
■ Ensuring Business Continuity
■ Maintaining Customer Trust
■ Upholding an Organization’s Reputation
To overcome the challenges associated with maintaining availability, the best strategy is to use redundancy in your systems and network designs. What are 4 different types of redundancy?
- Server Redundancy
- Data Redundancy
- Network Redundancy
- Power Redundancy
What is Redundancy?
Duplication of critical components or functions of a system with the intention of enhancing its reliability
What is Server Redundancy?
Involves using multiple servers in a load balanced or failover configuration
so that if one is overloaded or fails, the other servers can take over the
load to continue supporting your end users
What is Data Redundancy?
Involves storing data in multiple places
What is Network Redundancy?
Ensures that if one network path fails, the data can travel through
another route
What is Power Redundancy?
Involves using backup power sources, like generators and UPS systems
What is Non-repudiation?
■ Focused on providing undeniable proof in the world of digital transactions
■ Security measure that ensures individuals or entities involved in a
communication or transaction cannot deny their participation or the authenticity
of their actions
What are Digital Signatures?
■ Considered to be unique to each user who is operating within the digital domain
■ Created by first hashing a particular message or communication that you want to
digitally sign, and then it encrypts that hash digest with the user’s private key using asymmetric encryption
Non-repudiation is important for three main reasons
■ To confirm the authenticity of digital transactions
■ To ensure the integrity of critical communications
■ To provide accountability in digital processes
What is Authentication?
Security measure that ensures individuals or entities are who they claim to be during a communication or transaction
What are 5 commonly used authentication methods?
- Something you know (Knowledge Factor)
- Something you have (Possession Factor)
- Something you are (Inherence Factor)
- Something you do (Action Factor)
- Somewhere you are (Location Factor)
Something you know (Knowledge Factor)
Relies on information that a user can recall
Something you have (Possession Factor)
Relies on the user presenting a physical item to authenticate themselves
Something you are (Inherence Factor)
Relies on the user providing a unique physical or behavioral characteristic of the person to validate that they are who they claim to be
Something you do (Action Factor)
Relies on the user conducting a unique action to prove who they are
Somewhere you are (Location Factor)
Relies on the user being in a certain geographic location before access is
granted
What is Multi-Factor Authentication System (MFA)
Security process that requires users to provide multiple methods of identification
to verify their identity
Authentication is critical to understand because of the following
■ To prevent unauthorized access
■ To protect user data and privacy
■ To ensure that resources are accessed by valid users only
What is Authorization?
Pertains to the permissions and privileges granted to users or entities after they have been authenticated
Authorization mechanisms are important to help us with the following
■ To protect sensitive data
■ To maintain the system integrity in our organizations
■ To create a more streamlined user experience
What is Accounting?
Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded
Your organization should use a robust accounting system so that you can create the following 5 important tasks
- Create an audit trail
- Maintain regulatory compliance
- Conduct forensic analysis
- Perform resource optimization
- Achieve user accountability
What does Creating an audit trail do?
Provides a chronological record of all user activities that can be used to
trace changes, unauthorized access, or anomalies back to a source or
point in time
What does Maintaining regulatory compliance do?
Maintains a comprehensive record of all users’ activities
What does Conducting forensic analysis do?
Uses detailed accounting and event logs that can help cybersecurity
experts understand what happened, how it happened, and how to prevent similar incidents from occurring again
What does Performing resource optimization do?
Organizations can optimize system performance and minimize costs by
tracking resource utilization and allocation decisions
What does Achieving user accountability do?
Thorough accounting system ensures users’ actions are monitored and logged , deterring potential misuse and promoting adherence to the organization’s policies
To perform accounting, we usually use different technologies like the following 3
- Syslog Servers
- Network Analysis Tools
- Security Information and Event Management (SIEM) Systems
For accounting purposes, what are Syslog Servers used for?
Used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies in the organization’s systems
For accounting purposes, what are Network Analysis Tools used for?
Used to capture and analyze network traffic so that network
administrators can gain detailed insights into all the data moving within a
network
For accounting purposes, what are Security Information and Event Management (SIEM) Systems used for?
Provides us with a real-time analysis of security alerts generated by
various hardware and software infrastructure in an organization
What are 4 broad categories of Security Controls?
- Technical Controls
- Managerial Controls
- Operational Controls
- Physical Controls
What are Technical Controls?
Technologies, hardware, and software mechanisms that are implemented
to manage and reduce risks
What are Managerial Controls?
● Sometimes also referred to as administrative controls
● Involve the strategic planning and governance side of security
What are Operational Controls?
● Procedures and measures that are designed to protect data on a
day-to-day basis
● Are mainly governed by internal processes and human actions
What are Physical Controls?
Tangible, real-world measures taken to protect assets
What are 6 Basic Types of Security Controls?
- Preventive Controls
- Deterrent Controls
- Detective Controls
- Corrective Controls
- Compensating Controls
- Directive Controls
What are Preventive Controls?
Proactive measures implemented to thwart potential security threats or
breaches
What are Deterrent Controls?
Discourage potential attackers by making the effort seem less appealing
or more challenging
What are Detective Controls?
Monitor and alert organizations to malicious activities as they occur or shortly thereafter
What are Corrective Controls?
Mitigate any potential damage and restore our systems to their normal
state
What are Compensating Controls?
Alternative measures that are implemented when primary security
controls are not feasible or effective
What are Directive Controls?
● Guide, inform, or mandate actions
● Often rooted in policy or documentation and set the standards for
behavior within an organization
What is Gap Analysis?
Process of evaluating the differences between an organization’s current performance and its desired performance. Conducting a gap analysis can be a valuable tool for organizations looking to improve their operations, processes, performance, or overall security posture
There are 4 main steps involved in conducting a gap analysis
■ Define the scope of the analysis
■ Gather data on the current state of the organization
■ Analyze the data to identify any areas where the organization’s current
performance falls short of its desired performance
■ Develop a plan to bridge the gap
2 Basic Types of Gap Analysis
■ Technical Gap Analysis
■ Business Gap Analysis
What is a Technical Gap Analysis?
● Involves evaluating an organization’s current technical infrastructure
● identifying any areas where it falls short of the technical capabilities
required to fully utilize their security solutions
What is a Business Gap Analysis?
● Involves evaluating an organization’s current business processes
● Identifying any areas where they fall short of the capabilities required to
fully utilize cloud-based solutions
What are Plan of Action and Milestones (POA&M) for gap analyses?
● Outlines the specific measures to address each vulnerability
● Allocate resources
● Set up timelines for each remediation task that is needed
What does Zero Trust demand?
verification for every device, user, and transaction within the
network, regardless of its origin
To create a zero trust architecture, we need to use two different planes
- Control Plane
- Data Plane
What does the Control Plane refer to?
Refers to the overarching framework and set of components responsible
for defining, managing, and enforcing the policies related to user and
system access within an organization
Which 4 key elements does the Control Plane Encompass?
- Adaptive Identity
- Threat Scope Reduction
- Policy-Driven Access Control
- Secured Zones
What is Adaptive Identity?
Relies on real-time validation that takes into account the
user’s behavior, device, location, and more
What is Threat Scope Reduction?
■ Limits the users’ access to only what they need for their
work tasks because this reduces the network’s potential
attack surface
■ Focused on minimizing the “blast radius” that could occur
in the event of a breach
What is Policy-Driven Access Control?
Entails developing, managing, and enforcing user access
policies based on their roles and responsibilities
What are Secured Zones?
Isolated environments within a network that are designed to house sensitive data
Control Plane uses a ——– and a ——– to make
decisions about access
Policy Engine and Policy Administrator
What does a Policy Engine do?
Cross-references the access request with its predefined
policies
What is a Policy Administrator used for?
Used to establish and manage the access policies
What does a data plane consist of?
Subject/System and Policy Enforcement Point
What does a Subject/System refer to in terms of a data plane?
Refers to the individual or entity attempting to gain access
What does a Policy Enforcement Point refer to in terms of a data plane?
Where the decision to grant or deny access is actually executed