Fundamentals of Security Flashcards
Objectives 1.1 and 1.2
Define / Explain
Information Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Define / Explain
Information Systems Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data
Define / Explain
Confidentiality
CIA Triad
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Ensures information is acessible only to authorized personnel (e.g., encryption)
CIA Triad - Confidentiality
Define / Explain
Integrity
CIA Triad
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Ensures data remains accurate and unaltered (e.g., checksums)
CIA Triad - Integrity
Define / Explain
Availability
CIA Triad
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Ensures information and resources are accessible when needed (e.g., redundancy measures)
CIA Triad - Availability
Define / Explain
CIANA Pentagon
CIA Triad + NA = CIANA Pentagon
Obj. 1.0 - General Security Concepts | Fundamentals of Security
An extension of the CIA triad with the addition of non-repudiation and authentication
CIANA Pentagon = Non-repudiation + Authentication
Define / Explain
Non-Repudiation
CIA Triad + NA = CIANA Pentagon
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)
CIANA Pentagon - Non-repudiation
Define / Explain
Authentication
AAA / Triple A’s of Security & CIANA Pentagon
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Verifying the identity of a user or system (e.g., password checks)
AAA / Triple A’s of Security & CIANA Pentagon - Authentication
Define / Explain
Authorization
AAA / Triple A’s of Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Determining actions or resources an authenticated user can access (e.g., permissions)
AAA / Triple A’s of Security
Define / Explain
Accounting
AAA / Triple A’s of Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Tracking user activities and resource usage for audit or billing purposes
AAA / Triple A’s of Security
List the following
Security Control Categories
Obj. 1.0 - General Security Concepts | Fundamentals of Security
- Technical
- Managerial
- Operational
- Physical
Security Control Categories (4)
List the following
Security Control Types
Obj. 1.0 - General Security Concepts | Fundamentals of Security
- Preventative
- Deterrent
- Detective
- Corrective
- Compensating
- Directive
Security Control Types (5)
Define / Explain
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Operates on the principle that no one should be trusted by default
Informational
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
To achieve zero trust, we use the control plane and the data plane
Informational
Define / Explain
Control Plane
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
Define / Explain
Data Plane
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Subject/system, policy engine, policy administrator, and establishing policy enforcement points
Define / Explain
Threat
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
Anything that could cause harm, loss, damage, or compromise to our information technology systems
Informational
Threats can come from the following…
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
- Natural disasters
- Cyber-attacks
- Data integrity breaches
- Disclosure of confidential information
Informational
Define / Explain
Vulnerability
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
Any weakness in the system design or implementation
Informational
Vulnerabilities can come from internal factors like the following…
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
- Software bugs
- Misconfigured software
- Improperly protected network devices
- Missing security patches
- Lack of physical security
Informational
Informational
Where threats and vulnerabilities intersect, that is where the risk to your enterprise systems and networks lies
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
- If you have a threat, but there is no matching vulnerability to it, t hen you have no risk
- The same holds true that if you have a vulnerability but there’s no threat against it, there would be no risk
Informational
Define / Explain
Risk Management
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome
Informational
Confidentiality…
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
- Refers to the protection of information from unauthorized access and disclosure
- Ensure that private or sensitive information is not available or disclosed to unauthorized individuals, entities, or processes
Informational
Informational
Confidentiality is important for three main reasons…
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
- To protect personal privacy
- To maintain a business advantage
- To achieve regulatory compliance
Informational
Define / Explain
Encryption
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
Process of converting data into a code to prevent unauthorized access
(5) Basic methods of confidentiality
Define / Explain
Access Controls
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
By setting up strong user permissions, you ensure that only authorized personnel can access certain types of data
(5) Basic methods of confidentiality
Define / Explain
Data Masking
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users
(5) Basic methods of confidentiality
Define / Explain
Physical Security Measures
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
Ensure confidentiality for both physical types of data, such as paper records stored in a filing cabinet, and for digital information contained on servers and workstations
(5) Basic methods of confidentiality
Define / Explain
Training & Awareness
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
Conduct regular training on the security awareness best practices that employees can use to protect their organization’s sensitive data
(5) Basic methods of confidentiality
Informational
Integrity…
Obj. 1.2 - Summarize fundamental security concepts | Integrity
- Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
- Verifies the accuracy and trustworthiness of data over the entire lifecycle
Informational
Informational
Integrity is important for three main reasons…
Obj. 1.2 - Summarize fundamental security concepts | Integrity
- To ensure data accuracy
- To maintain trust
- To ensure system operability
Informational
Informational
To help us maintain the integrity of our data, systems, and networks, we usually utilize five methods
Obj. 1.2 - Summarize fundamental security concepts | Integrity
- Hashing
- Digital Signatures
- Checksums
- Access Controls
- Regular Audits
Informational
Define / Explain
Hashing
Obj. 1.2 - Summarize fundamental security concepts | Integrity
Process of converting data into a fixed-size value
(5) Methods of integrity
Define / Explain
Digital Signatures
Obj. 1.2 - Summarize fundamental security concepts | Integrity
Ensures both integrity and authenticity
(5) Methods of integrity
Define / Explain
Checksums
Obj. 1.2 - Summarize fundamental security concepts | Integrity
Method to verify the integrity of data during transmission
(5) Methods of integrity
Define / Explain
Access Controls
Obj. 1.2 - Summarize fundamental security concepts | Integrity
Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations
(5) Methods of integrity
Define / Explain
Regular Audits
Obj. 1.2 - Summarize fundamental security concepts | Integrity
Involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed
(5) Methods of integrity
Define / Explain
Availability
Obj. 1.2 - Summarize fundamental security concepts | Availability
Ensures that information, systems, and resources are accessible and operational when needed by authorized users
Informational
As cybersecurity professionals, we value availability since it can help us with the following…
Obj. 1.2 - Summarize fundamental security concepts | Availability
- Ensuring Business Continuity
- Maintaining Customer Trust
- Upholding an Organization’s Repudiation
Informational
Informational, both sides
To overcome the challenges associated with maintaining availability, the best strategy is to use redundancy in your systems and network designs
Obj. 1.2 - Summarize fundamental security concepts | Availability
To overcome the challenges associated with maintaining availability, the best strategy is to use redundancy in your systems and network designs
Informational, both sides
Define / Explain
Redundancy
Obj. 1.2 - Summarize fundamental security concepts | Availability
Duplication of critical components or functions of a system with the intention of enhancing its reliability