General Security Concepts: Examine the Principle of Security Flashcards

1
Q

What is the Security Triangle?

A

C.I.A - Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the goal of Confidentiality?

A

Confidentiality: Ensure sensitive data is accessible only to authorized individuals or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the goal of integrity?

A

Integrity: Ensure data remains accurate, consistent, and unaltered during storage, transmission, and processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the goal of Availability?

A

Availability: Ensure authorized users have timely and uninterrupted access to resources and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four concepts that supports the CIA?

A

Non-Repudiation
Authenticity
Accountability
Principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is non-Repudiation?

A

Non-repudiation: Ensure that individuals can’t deny their actions or transactions and enhance accountability, which helps strengthen the

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Authenticity?

A

Authenticity: Confirming the legitimacy of users, data sources, and communications helps ensure that information is accurate, trustworthy, and free from unauthorized alterations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is accountability?

A

Accountability: Establishing a traceable record of actions and activities that make individuals responsible for their actions contributes to the overall security and integrity of data, systems, and communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Principle of least privilage?

A

Principle of least privilege: Restricting user and system permissions to the minimum necessary level reduces potential attack surfaces and safeguards the confidentiality, integrity, and availability of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to accomplish Confidentiality?

A

Encryption: Convert sensitive data into a scrambled output using complex algorithms that help prevent unauthorized access.

Access controls: Regulating and restricting entry to sensitive information helps ensure you allow only authorized users access to data, systems, or resources.

Secure communication channels: Employing encryption and authentication mechanisms help safeguard the transmission of sensitive data from unauthorized interception or eavesdropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What factors do you need to help ensure integrity?

A

Hashing: Generating fixed-size unique values from data enables verification of data integrity. Any alterations to the original data would result in a different hash value.

Digital signatures: Using cryptographic techniques to associate a unique digital identifier with a message or document allows recipients to verify both the sender’s authenticity and the document’s integrity.

Integrity checks: Comparing the current state of data or systems with a trusted reference enables you to detect any unauthorized changes or modifications that have occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What factors do you need to help ensure availability?

A

Redundancy: Duplicating critical components or systems helps ensure that if one fails, another can seamlessly take over. This minimizes downtime and helps maintain continuous access to resources.

Load balancing: Distributing incoming network traffic or workloads across systems helps prevent them from becoming overwhelmed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly