Fundamentals of Security Flashcards
Information Systems Security
Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data
Information Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Name the 3 parts of the CIA Triad
Confidentiality, Integrity, Availability
Define Confidentiality
Ensures information is accessible only to authorized personnel (e.g.,
encryption)
Define Integrity
Ensures data remains accurate and unaltered (e.g., checksums)
Define Availability
Ensures information and resources are accessible when needed (e.g.,
redundancy measures)
Define Non-Repudiation
Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)
What is the CIANA Pentagon?
An extension of the CIA triad with the addition of non-repudiation and
authentication
What are the Triple A’s of Security?
Authentication, Authorization, Accounting
Define Authentication
Verifying the identity of a user or system (e.g., password checks)
Define Authorization
Determining actions or resources an authenticated user can access (e.g.,
permissions)
Define Accounting
Tracking user activities and resource usage for audit or billing purposes
Name the 4 Security Control Categories
■ Technical
■ Managerial
■ Operational
■ Physical
Name the 6 Security Control Types
■ Preventative
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive
What is the Zero Trust Model?
Operates on the principle that no one should be trusted by default
What 2 things do we use to achieve zero trust?
The control plane and the data plane
Control Plane
- Adaptive identity
- threat scope reduction
- policy-driven access control
- secured zones
Data Plane
- Subject/system
- policy engine
- policy administrator
- establishing policy enforcement points
What is a threat?
Anything that could cause harm, loss, damage, or compromise to our information technology systems
A threat can come from the following 4 things
● Natural disasters
● Cyber-attacks
● Data integrity breaches
● Disclosure of confidential information
What is a vulnerability?
Any weakness in the system design or implementation
A vulnerability can come from internal factors like the following
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security
Where threats and vulnerabilities intersect, that is where the risk to your enterprise systems and networks lies
■ If you have a threat, but there is no matching vulnerability to it, then you have no risk
■ The same holds true that if you have a vulnerability but there’s no threat against it, there would be no risk
What is Risk Managment?
Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome
What does Confidentiality refer to and what does it ensure?
■ Refers to the protection of information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes
Confidentiality is important for 3 main reasons
■ To protect personal privacy
■ To maintain a business advantage
■ To achieve regulatory compliance
To ensure confidentiality, we use five basic methods
- Encryption
- Access Controls
- Data Masking
- Physical Security Measures
- Training and Awareness
What is Encryption?
Process of converting data into a code to prevent unauthorized access
How are Access Controls good for Confidentiality?
By setting up strong user permissions, you ensure that only authorized personnel can access certain types data
What is Data Masking?
Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users
What are Physical Security Measures?
Ensure confidentiality for both physical types of data, such as paper records stored in a filing cabinet, and for digital information contained on servers and workstations
What is Training and Awareness?
Conduct regular training on the security awareness best practices that
employees can use to protect their organization’s sensitive data
What does Integrity help ensure and verify?
■ Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
■ Verifies the accuracy and trustworthiness of data over the entire lifecycle
Integrity is important for three main reasons
■ To ensure data accuracy
■ To maintain trust
■ To ensure system operability
To help us maintain the integrity of our data, systems, and networks, we usually utilize five methods
- Hashing
- Digital Signatures
- Checksums
- Access Controls
- Regular Audits
What is Hashing?
Process of converting data into a fixed-size value
What do digital signatures ensure?
Ensure both integrity and authenticity
What are Checksums?
Method to verify the integrity of data during transmission
Why are Access Controls good for Integrity?
Ensure that only authorized individuals can modify data and this reduces
the risk of unintentional or malicious alterations
Why are regular audits good for Integrity?
Involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed
What does Availability ensure?
Ensure that information, systems, and resources are accessible and operational when needed by authorized users
As cybersecurity professionals, we value availability since it can help us with the following
■ Ensuring Business Continuity
■ Maintaining Customer Trust
■ Upholding an Organization’s Reputation