Fundamentals of Security Flashcards
Information Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Information Systems Security
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data
CIA Triad
Confidentiality
- Ensures information is accessible only to authorized personnel (e.g., encryption)
Integrity
- Ensures data remains accurate and unaltered (e.g., checksums)
Availability
- Ensures information and resources are accessible when needed (e.g., redundancy measures)
CIANA Pentagon
An extension of the CIA triad with the addition of non-repudiation and authentication
Triple A’s of Security
Authentication
- Verifying the identity of a user or system (e.g., password checks)
Authorization
- Determining actions or resources an authenticated user can access (e.g., permissions)
Accounting
- Tracking user activities and resource usage for audit or billing purposes
Cybersecurity Framework
o Identify – Develop security policies and capabilities. Evaluate risks, threats and vulnerabilities and recommend security controls to mitigate them/
o Protect
o Detect
o Respond
o Recover
What is Security Control and its Categories
A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information
Categories:
1: Managerial—the control gives oversight of the
information system. Examples could include risk
identification or a tool allowing the evaluation and
selection of other security controls.
2: Operational—the control is implemented primarily by
people. For example, security guards and training
programs are operational controls.
3: Technical—the control is implemented as a system
(hardware, software, or firmware). For example, firewalls,
antivirus software, and OS access control models are
technical controls.
4: Physical— controls such as alarms, gateways, locks,
lighting, and security cameras that deter and detect
access to premises and hardware are often placed in a
separate category to technical controls.
Security Control Types
Preventative
Deterrent
Detective
Corrective
Compensating
Directive
Zero Trust Model
Operates on the principle that no one should be trusted by default
To achieve zero trust, we use the ….
Control Plane
- Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
Data Plane
- Subject/system, policy engine, policy administrator, and establishing policy enforcement points
Threat
Anything that could cause harm, loss, damage, or compromise to our information technology systems.
Can come from the following:
1: Natural disasters
2: Cyber-attacks
3: Data integrity breaches
4: Disclosure of confidential information
Vulnerabilities
Any weakness in the system design or implementation.
Come from internal factors like the following:
- Software bugs
- Misconfigured software
- Improperly protected network devices
- Missing security patches
- Lack of physical security
Risk Management
Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome
- Where threats and vulnerabilities intersect, that is where the risk to your enterprise systems and networks lies
- If you have a threat, but there is no matching vulnerability to it, then you have no risk
- The same holds true that if you have a vulnerability but there’s no threat against it, there would be no risk
Confidentiality
Refers to the protection of information from unauthorized access and disclosure
Ensure that private or sensitive information is not available or disclosed to unauthorized individuals, entities, or processes
Confidentiality is important for 3 main reasons
1: To protect personal privacy
2: To maintain a business advantage
3: To achieve regulatory compliance
To ensure confidentiality, we use five basic methods
1: Encryption
- Process of converting data into a code to prevent unauthorized access
2: Access Controls
- By setting up strong user permissions, you ensure that only authorized personnel can access certain types of data
3: Data Masking
- Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users
4: Physical Security Measures
- Ensure confidentiality for both physical types of data, such as paper records stored in a filing cabinet, and for digital information contained on servers and workstations
5: Training and Awareness
- Conduct regular training on the security awareness best practices that employees can use to protect their organization’s sensitive data
Intrigity
Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
- Verifies the accuracy and trustworthiness of data over the entire lifecycle
Integrity is important for three main reasons
1: To ensure data accuracy
2: To maintain trust
3: To ensure system operability
To help us maintain the integrity of our data, systems, and networks, we usually utilize five methods
1: Hashing
- Process of converting data into a fixed-size value
2: Digital Signatures
- Ensure both integrity and authenticity
3: Checksums
- Method to verify the integrity of data during transmission
4: Access Controls
- Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations
5: Regular Audits
- Involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed
Availability
Ensure that information, systems, and resources are accessible and operational when needed by authorized users