Fundamentals of Security Flashcards
Objectives 1.1 and 1.2
Define / Explain
Information Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Define / Explain
Information Systems Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data
Define / Explain
Confidentiality
CIA Triad
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Ensures information is acessible only to authorized personnel (e.g., encryption)
CIA Triad - Confidentiality
Define / Explain
Integrity
CIA Triad
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Ensures data remains accurate and unaltered (e.g., checksums)
CIA Triad - Integrity
Define / Explain
Availability
CIA Triad
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Ensures information and resources are accessible when needed (e.g., redundancy measures)
CIA Triad - Availability
Define / Explain
CIANA Pentagon
CIA Triad + NA = CIANA Pentagon
Obj. 1.0 - General Security Concepts | Fundamentals of Security
An extension of the CIA triad with the addition of non-repudiation and authentication
CIANA Pentagon = Non-repudiation + Authentication
Define / Explain
Non-Repudiation
CIA Triad + NA = CIANA Pentagon
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)
CIANA Pentagon - Non-repudiation
Define / Explain
Authentication
AAA / Triple A’s of Security & CIANA Pentagon
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Verifying the identity of a user or system (e.g., password checks)
AAA / Triple A’s of Security & CIANA Pentagon - Authentication
Define / Explain
Authorization
AAA / Triple A’s of Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Determining actions or resources an authenticated user can access (e.g., permissions)
AAA / Triple A’s of Security
Define / Explain
Accounting
AAA / Triple A’s of Security
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Tracking user activities and resource usage for audit or billing purposes
AAA / Triple A’s of Security
List the following
Security Control Categories
Obj. 1.0 - General Security Concepts | Fundamentals of Security
- Technical
- Managerial
- Operational
- Physical
Security Control Categories (4)
List the following
Security Control Types
Obj. 1.0 - General Security Concepts | Fundamentals of Security
- Preventative
- Deterrent
- Detective
- Corrective
- Compensating
- Directive
Security Control Types (5)
Define / Explain
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Operates on the principle that no one should be trusted by default
Informational
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
To achieve zero trust, we use the control plane and the data plane
Informational
Define / Explain
Control Plane
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
Define / Explain
Data Plane
Zero Trust Model
Obj. 1.0 - General Security Concepts | Fundamentals of Security
Subject/system, policy engine, policy administrator, and establishing policy enforcement points
Define / Explain
Threat
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
Anything that could cause harm, loss, damage, or compromise to our information technology systems
Informational
Threats can come from the following…
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
- Natural disasters
- Cyber-attacks
- Data integrity breaches
- Disclosure of confidential information
Informational
Define / Explain
Vulnerability
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
Any weakness in the system design or implementation
Informational
Vulnerabilities can come from internal factors like the following…
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
- Software bugs
- Misconfigured software
- Improperly protected network devices
- Missing security patches
- Lack of physical security
Informational
Informational
Where threats and vulnerabilities intersect, that is where the risk to your enterprise systems and networks lies
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
- If you have a threat, but there is no matching vulnerability to it, t hen you have no risk
- The same holds true that if you have a vulnerability but there’s no threat against it, there would be no risk
Informational
Define / Explain
Risk Management
Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities
Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome
Informational
Confidentiality…
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
- Refers to the protection of information from unauthorized access and disclosure
- Ensure that private or sensitive information is not available or disclosed to unauthorized individuals, entities, or processes
Informational
Informational
Confidentiality is important for three main reasons…
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
- To protect personal privacy
- To maintain a business advantage
- To achieve regulatory compliance
Informational
Define / Explain
Encryption
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
Process of converting data into a code to prevent unauthorized access
(5) Basic methods of confidentiality
Define / Explain
Access Controls
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
By setting up strong user permissions, you ensure that only authorized personnel can access certain types of data
(5) Basic methods of confidentiality
Define / Explain
Data Masking
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users
(5) Basic methods of confidentiality
Define / Explain
Physical Security Measures
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
Ensure confidentiality for both physical types of data, such as paper records stored in a filing cabinet, and for digital information contained on servers and workstations
(5) Basic methods of confidentiality
Define / Explain
Training & Awareness
Obj. 1.2 - Summarize fundamental security concepts | Confidentiality
Conduct regular training on the security awareness best practices that employees can use to protect their organization’s sensitive data
(5) Basic methods of confidentiality
Informational
Integrity…
Obj. 1.2 - Summarize fundamental security concepts | Integrity
- Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
- Verifies the accuracy and trustworthiness of data over the entire lifecycle
Informational
Informational
Integrity is important for three main reasons…
Obj. 1.2 - Summarize fundamental security concepts | Integrity
- To ensure data accuracy
- To maintain trust
- To ensure system operability
Informational
Informational
To help us maintain the integrity of our data, systems, and networks, we usually utilize five methods
Obj. 1.2 - Summarize fundamental security concepts | Integrity
- Hashing
- Digital Signatures
- Checksums
- Access Controls
- Regular Audits
Informational
Define / Explain
Hashing
Obj. 1.2 - Summarize fundamental security concepts | Integrity
Process of converting data into a fixed-size value
(5) Methods of integrity
Define / Explain
Digital Signatures
Obj. 1.2 - Summarize fundamental security concepts | Integrity
Ensures both integrity and authenticity
(5) Methods of integrity
Define / Explain
Checksums
Obj. 1.2 - Summarize fundamental security concepts | Integrity
Method to verify the integrity of data during transmission
(5) Methods of integrity
Define / Explain
Access Controls
Obj. 1.2 - Summarize fundamental security concepts | Integrity
Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations
(5) Methods of integrity
Define / Explain
Regular Audits
Obj. 1.2 - Summarize fundamental security concepts | Integrity
Involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed
(5) Methods of integrity
Define / Explain
Availability
Obj. 1.2 - Summarize fundamental security concepts | Availability
Ensures that information, systems, and resources are accessible and operational when needed by authorized users
Informational
As cybersecurity professionals, we value availability since it can help us with the following…
Obj. 1.2 - Summarize fundamental security concepts | Availability
- Ensuring Business Continuity
- Maintaining Customer Trust
- Upholding an Organization’s Repudiation
Informational
Informational, both sides
To overcome the challenges associated with maintaining availability, the best strategy is to use redundancy in your systems and network designs
Obj. 1.2 - Summarize fundamental security concepts | Availability
To overcome the challenges associated with maintaining availability, the best strategy is to use redundancy in your systems and network designs
Informational, both sides
Define / Explain
Redundancy
Obj. 1.2 - Summarize fundamental security concepts | Availability
Duplication of critical components or functions of a system with the intention of enhancing its reliability
Informational
There are various types of redundancy you need to consider when designing your systems and networks…
Obj. 1.2 - Summarize fundamental security concepts | Availability
- Server Redundancy
- Data Redundancy
- Network Redundancy
- Power Redundancy
Informational
Define / Explain
Server Redundancy
Obj. 1.2 - Summarize fundamental security concepts | Availability
Involves using multiple servers in a load balanced or failover configuration so that if one is overloaded or fails, the other servers can take over the load to continue supporting your end users
Define / Explain
Data Redundancy
Obj. 1.2 - Summarize fundamental security concepts | Availability
Involves storing data in multiple places
Define / Explain
Network Redundancy
Obj. 1.2 - Summarize fundamental security concepts | Availability
Ensures that if one network path fails, the data can travel through another route
Define / Explain
Power Redundancy
Obj. 1.2 - Summarize fundamental security concepts | Availability
Involes using backup power sources, like generators and UPS systems
UPS = Uninterruptable Power Supply
Informational
Non-repudiation
Obj. 1.2 - Summarize fundamental security concepts | Non-repudiation
- Focused on providing undeniable proof in the world of digital transactions
- Security measure that ensures individuals or entities involved in a communication or transaction cannot deny their participation or the authenticity of their actions
Informational
Informational
Digital Signatures
Obj. 1.2 - Summarize fundamental security concepts | Non-repudiation
- Considered to be unique to each user who is operating within the digital domain
- Created by first hashing a particular message or communication that you want to digitally sign, and then it encrypts that hash digest with the user’s private key using asymmetric encryption
Informational
Informational
Non-repudiation is important for three main reasons…
Obj. 1.2 - Summarize fundamental security concepts | Non-repudiation
- To confirm the authenticity of digital transactions
- To ensure the integrity of critical communications
- To provide accountability in digital processes
Informational
Define / Explain
Authentication
Obj. 1.2 - Summarize fundamental security concepts | Authentication
Security measure that ensures invidivuals or entities are who they claim to be during a communication or transaction
Informational
Five commonly used authentication methods are…
Obj. 1.2 - Summarize fundamental security concepts | Authentication
- Something you know (Knowledge Factor)
- Something you have (Possession Factor)
- Something you are (Inherence Factor)
- Something you do (Action Factor)
- Somewhere you are (Location Factor)
Informational
Define / Explain
Something you know
Obj. 1.2 - Summarize fundamental security concepts | Authentication
Relies on information that a user can recall
Knowledge Factor
(5) commonly used authentication methods
Define / Explain
Something you have
Obj. 1.2 - Summarize fundamental security concepts | Authentication
Relies on the user presenting a physical item to authenticate themselves
Possession Factor
(5) commonly used authentication methods
Define / Explain
Something you are
Obj. 1.2 - Summarize fundamental security concepts | Authentication
Relies on the user providing a unique physical or behavioral characteristic of the person to validate that they are who they claim to be
Inherence Factor
(5) commonly used authentication methods
Define / Explain
Something you do
Obj. 1.2 - Summarize fundamental security concepts | Authentication
Relies on the user conducting a unique action to prove who they are
Action Factor
(5) commonly used authentication methods
Define / Explain
Somewhere you are
Obj. 1.2 - Summarize fundamental security concepts | Authentication
Relies on the user being in a certain geographic location before access is granted
Location Factor
(5) commonly used authentication methods
Define / Explain
Multifactor Authentication System
Obj. 1.2 - Summarize fundamental security concepts | Authentication
Security process that requires users to provide multiple methods of identification to verify their identity
MFA = Multifactor Authentication
Informational
Authenticaiton is critical to understand because of the following…
Obj. 1.2 - Summarize fundamental security concepts | Authentication
- To prevent unauthorized access
- To protect user data and privacy
- To ensure that resources are accessed by valid users only
Informational
Define / Explain
Authorization
Obj. 1.2 - Summarize fundamental security concepts | Authorization
Pertains to the permissions and privileges granted to users or entities after they have been authenticated
Informational
Authorization mechanisms are important to help us with the following…
Obj. 1.2 - Summarize fundamental security concepts | Authorization
- To protect sensitive data
- To maintain the system integrity in our organizations
- To create a more streamlined user experience
Informational
Define / Explain
Accounting
Obj. 1.2 - Summarize fundamental security concepts | Accounting
Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded
Informational
Your organization should use a robust accounting system so that you can create the following…
Obj. 1.2 - Summarize fundamental security concepts | Accounting
- Create an audit trail
- Maintain regulatory compliance
- Conduct forensic analysis
- Perform resource optimization
- Achieve user accountability
Informational
Define / Explain
Create an audit trail
Accounting System
Obj. 1.2 - Summarize fundamental security concepts | Accounting
Provides a chronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to a source or point in time
Define / Explain
Maintain regulatory compliance
Accounting System
Obj. 1.2 - Summarize fundamental security concepts | Accounting
Maintains a comprehensive record of all users’ activities
Define / Explain
Conduct forensic analysis
Accounting System
Obj. 1.2 - Summarize fundamental security concepts | Accounting
Uses detailed accounting and event logs that can help cybersecurity experts understand what happened, how it happened, and how to prevent similar incidents from occurring again
Define / Explain
Perform resource optimization
Accounting System
Obj. 1.2 - Summarize fundamental security concepts | Accounting
Organizations can optimize system performance and minimize costs by tracking resource utilization and allocation decisions
Define / Explain
Achieve user accountability
Accounting System
Obj. 1.2 - Summarize fundamental security concepts | Accounting
Thorough accounting system ensures users’ actions are monitored and logged, deterring potential misuse and promoting adherence to the organization’s policies
Informational
To perform accounting, we usually use different technologies like the following…
Obj. 1.2 - Summarize fundamental security concepts | Accounting
- Syslog Servers
- Network Analysis Tools
- SIEM Systems
SIEM = Security Information and Event Management
Informational
Define / Explain
Syslog Servers
Obj. 1.2 - Summarize fundamental security concepts | Accounting
Used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies in the organization’s systems
Example: Kiwi Syslog Server NG by SolarWinds
Define / Explain
Network Analysis Tools
Obj. 1.2 - Summarize fundamental security concepts | Accounting
Used to capture and analyze network traffic so that network administrators can gain detailed insights into all the data moving within a network
Example: Wireshark
Define / Explain
SIEM Systems
SIEM = Security Information and Event Management
Obj. 1.2 - Summarize fundamental security concepts | Accounting
Provides us with real-time analysis of security alerts generated by various hardware and software infrastructure in an organization
Example: Splunk
Informational
(4) Broad Categories of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Categories
- Technical Controls
- Managerial Controls
- Operational Controls
- Physical Controls
Informational
Define / Explain
Technical Controls
(4) Broad Categories of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Categories
Technologies, hardware, and software mechanisms that are implemented to manage and reduce risks
Define / Explain
Managerial Controls
(4) Broad Categories of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Categories
- Sometimes also referred to as administrative controls
- Involves the strategic planning and governance side of security
Define / Explain
Operational Controls
(4) Broad Categories of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Categories
- Procedures and measures that are designed to protect data on a day-to-day basis
- Are mainly governed by internal processes and human actions
Define / Explain
Physical Controls
(4) Broad Categories of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Categories
Tangible, real-world measures taken to protect assets
Informational
(6) Basic Types of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Types
- Preventic Controls
- Deterrent Controls
- Detective Controls
- Corrective Controls
- Compensating Controls
- Directive Controls
Informational
Define / Explain
Preventive Controls
(6) Basic Types of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Types
Proactive measures implemented to thwart potential security threats or breaches
Define / Explain
Deterrent Controls
(6) Basic Types of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Types
Discourage potential attackers by making the effort seem less appealing or more challenging
Define / Explain
Detective Controls
(6) Basic Types of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Types
Monitor and alert organizations to malicious activities as they occur or shortly thereafter
Define / Explain
Corrective Controls
(6) Basic Types of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Types
Mitigate any potential damage and restore our systems to their normal state
Define / Explain
Compensating Controls
(6) Basic Types of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Types
Alternative measures that are implemented when primary security controls are not feasible or effective
Define / Explain
Directive Controls
(6) Basic Types of Security Controls
Obj. 1.1 - Summarize fundamental security concepts | Security Control Types
- Guide, inform, or mandate actions
- Often rooted in policy or documentation and set the standards for behavior within an organization
Define / Explain
Gap Analysis
Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis
Process of evaluating the differences between an organization’s current performance and its desired performance
Informational, both sides
Conducting a gap analysis can be a valuable tool for organizations looking to improve their operations, processes, performance, or overall security posture
Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis
Conducting a gap analysis can be a valuable tool for organizations looking to improve their operations, processes, performance, or overall security posture
Informational, both sides
Informational
There are several steps involved in conducting a gap analysis…
Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis
- Define the scope of the analysis
- Gather data on the current state of the organization
- Analyze the data to identify any areas where the organization’s current performance falls short of its desired performance
- Develop a plan to bridge the gap
Informational
Informational
(2) Basic Types of Gap Analysis
Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis
- Technical Gap Analysis
- Business Gap Analysis
Informational
Define / Explain
Technical Gap Analysis
(2) Basic Types of Gap Analysis
Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis
- Involves evaluating an organization’s current technical infrastructure
- Identifying any areas where it falls short of the technical capabilities required to fully utilize their security solutions
Define / Explain
Business Gap Analysis
(2) Basic Types of Gap Analysis
Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis
- Involves evaluating an organization’s current business processes
- Identifying any areas where they fall short of the capabilities required to fully utilize cloud-based solutions
Informational
Plan of Action and Milestones (POA&M)
Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis
- Outlines the specific measures to address each vulnerability
- Allocate resources
- Set up timelines for each remediation task that is needed
POA&M = Plan of Action & Milestones
Informational, both sides
Zero Trust demands verification for every device, user, and transaction within the network, regardless of its origin
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
Zero Trust demands verification for every device, user, and transaction within the network, regardless of its origin
Informational, both sides
Informational
To create a zero trust architecture, we need to use two different planes
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
- Control Plane
- Data Plane
Informational
Define / Explain
Control Plane
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
Refers to the overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization
Informational
Control Plane typically ecompasses several key elements…
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
- Adaptive Identity
- Threat Scope Reduction
- Policy-Driven Access Control
- Secured Zones
informational
Define / Explain
Adapative Identity
Control Plane elements
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
Relies on real-time validation that takes into account the user’s behavior, device, location, and more
Define / Explain
Threat Scope Reduction
Control Plane elements
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
- Limits the users’ access to only what they need for their work tasks because this reduces the network’s potential attack surface
- Focused on minimizing the “blast radius” that could occur in the event of a breach
Define / Explain
Policy-Driven Access Control
Control Plane elements
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
Entails developing, managing, and enforcing user access policies based on their roles and responsibilities
Define / Explain
Secured Zones
Control Plane elements
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
Isolated environments within a network that are designed to house sensitive data
Informational, both sides
Control Plane uses a Policy Engine and a Policy Administrator to make decisions about access
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
Control Plane uses a Policy Engine and a Policy Administrator to make decions about access
Informational, both sides
Define / Explain
Policy Engine
Control Plane decisions about access
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
Cross-references the access request with its predefined policies
Define / Explain
Policy Administrator
Control Plane decisions about access
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
Used to establish and manage the access policies
Informational
Data Plane consists of the following…
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
- Subject / System
- Policy Enforcement Point
Informational
Define / Explain
Subject / System
Data Plane definitions
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
Refers to the individual or entity attempting to gain access
Define / Explain
Policy Enforcement Point
Data Plane definitions
Obj. 1.2 - Summarize fundamental security concepts | Zero Trust
Where the decision to grant or deny access is actually executed