Fundamentals of Security Flashcards
What is information security?
Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction
What is information system security?
Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data
Examples of information security systems?
computers, servers, network devices
What is the CIA triad?
What does each one ensure?
Example of how each is achieved?
Confidentiality: Ensures information is accessible only to authorized personnel (e.g., encryption)
Integrity: Ensures data remains accurate and unaltered (e.g., checksums)
Availability: Ensures information and resources are accessible when needed (e.g.,
redundancy measures)
What is Non-repudiation?
Example of how it is achieved?
Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)
What is CIANA pentagon?
An extension of the CIA triad with the addition of non-repudiation and
authentication
What are the triple A’s of security?
Define each and give an example of each
Authentication: Verifying the identity of a user or system (e.g., password checks)
Authorization: Determining actions or resources an authenticated user can access (e.g., permissions)
Accounting: Tracking user activities and resource usage for audit or billing purposes
List the four security control categories
Technical, Managerial, Operational, Physical
List the six security control types
Deterrent, Detective, Directive, Corrective, Compensating, Preventative
What does the zero trust model operate on?
Operates on the principle that no one should be trusted by default
To achieve zero trust we use the ———— and ———- plane
Control; Data
Give examples of what constitute both control plane and data plane
Control plane: Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones
Data plane: Subject/system, policy engine, policy administrator, and policy enforcement points
What is a threat?
List some of the things that threat could come from
Anything that could cause harm, loss, damage, or compromise to our information
technology systems
Natural disasters, Cyber-attacks, Data integrity breaches, Disclosure of confidential information
What is vulnerability?
Vulnerability could come from?
Any weakness in the system design or implementation
Software bugs, Misconfigured software, Improperly protected network devices, Missing security patches, Lack of physical security
Where threat and vulnerability intersect is where ———– lies
Risk