Fundamentals Of Security Flashcards
What does the C.I.A Triad stand for?
Confidentiality, Integrity, Availability
These are the 3 pillars of security.
What is Confidentiality?
Ensures that information is only accessible to those with appropriate authorization.
What is Integrity?
Ensures that data remains accurate and unaltered unless modifications are required.
What is Availability?
Ensures that information and resources are accessible and functional when needed by authorized users.
What does C.I.A.N.A stand for?
Confidentiality, Integrity, Availability, Non-repudiation, Authentication.
What is Non-repudiation?
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.
Example: Digital signatures in emails.
What is Authentication?
Process of verifying the identity of a user or system.
What does A.A.A stand for?
Authentication, Authorization, Accounting.
What is Authorization?
Defines what actions or resources a user can access or perform.
What is Accounting?
Act of tracking user activities and resource usage, used for audit or billing purposes.
What are Security Controls?
Measures put in place to mitigate risk and protect the confidentiality, integrity, and availability of information systems and data.
Example: Zero Trust
What is the Zero Trust security model?
A security model that operates on the principle that no one, inside or out of the organization, should be trusted by default (verification required from anyone trying to gain access).
What is the Control Plane?
Consists of adaptive identity, threat scope reduction, policy-driven access control, and secured zones.
What is the Data Plane?
Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points.
What is needed to achieve Zero Trust?
Control Plane and Data Plane
What is Information Security?
Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction.