Fundamentals Of Security Flashcards
What does the C.I.A Triad stand for?
Confidentiality, Integrity, Availability
These are the 3 pillars of security.
What is Confidentiality?
Ensures that information is only accessible to those with appropriate authorization.
What is Integrity?
Ensures that data remains accurate and unaltered unless modifications are required.
What is Availability?
Ensures that information and resources are accessible and functional when needed by authorized users.
What does C.I.A.N.A stand for?
Confidentiality, Integrity, Availability, Non-repudiation, Authentication.
What is Non-repudiation?
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.
Example: Digital signatures in emails.
What is Authentication?
Process of verifying the identity of a user or system.
What does A.A.A stand for?
Authentication, Authorization, Accounting.
What is Authorization?
Defines what actions or resources a user can access or perform.
What is Accounting?
Act of tracking user activities and resource usage, used for audit or billing purposes.
What are Security Controls?
Measures put in place to mitigate risk and protect the confidentiality, integrity, and availability of information systems and data.
Example: Zero Trust
What is the Zero Trust security model?
A security model that operates on the principle that no one, inside or out of the organization, should be trusted by default (verification required from anyone trying to gain access).
What is the Control Plane?
Consists of adaptive identity, threat scope reduction, policy-driven access control, and secured zones.
What is the Data Plane?
Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points.
What is needed to achieve Zero Trust?
Control Plane and Data Plane
What is Information Security?
Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction.
What is Information Systems Security?
The act of protecting the systems that hold and process critical data.
What is a threat?
Anything that could cause harm, loss, damage, or compromise to our information technology systems.
Threats can come from natural disasters, cyber-attacks, data integrity breaches, or disclosure of confidential information.
What are examples of sources of threats?
Natural disasters, cyber-attacks, data integrity breaches, and disclosure of confidential information.
What is a vulnerability?
Any weakness in the system design or implementation.
Vulnerabilities can arise from internal factors.
What are examples of internal factors that can create vulnerabilities?
Software bugs, misconfigured software, improperly protected network devices, missing security patches, and lack of physical security.
What are the three main reasons for confidentiality?
- To protect personal privacy
- To maintain a business advantage
- To achieve regulatory compliance
What are the five basic methods to ensure confidentiality?
- Encryption
- Access Controls
- Data Masking
- Physical Security Measures
- Training and Awareness
What is encryption?
Process of converting data into a code to prevent unauthorized access.