Intro Flashcards
Define the CIA Triad
The protection of information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
What make up the CIA Triad
Confidentiality, Integrity, and Availability
Define Confidentiality
Confidentiality is synonymous with privacy. Confidentiality measures prevent data from falling into the hands of people who do not have authorization to access said information.
Define Integrity
In the information technology world, integrity is all about making sure information is accurate and always stays that way.
Define Availability
Ensuring availability requires routine maintenance and upgrading of hardware, software and operating system environments.
Vulnerability
A flaw, loophole, oversight, or error that can be exploited to violate system security policy.
Threat
A threat is an event, natural or man made, able to cause negative impact to an organization.
Exploit
An exploit is a defined way to breach the security of an IT system through a vulnerability.
Risk
It is a situation involving exposure to danger.
Vulnerability Assessment
A vulnerability assessment is a search for these weaknesses/exposures in order to apply a patch or fix to prevent a compromise.
- Many systems are shipped with: known and unknown security holes and bugs, and insecure default settings (passwords, etc).
- Many vulnerabilities occur as a result of misconfigurations by system administrators.
What are the Roles in Information Security?
CISO (Chief Information Security Officer)
Information Security Architect
Information security consultant/ Specialist
Information security analyst
Information security auditor
Security software developer
Penetration tester/ Ethical hacker
Vulnerability assessor
digital forensic analyst
SEM Engineer
Role of Information Security Officer
The chief information security officer is a high-level management position responsible for the entire computer security department and staff.
Define Information Security Analyst
this position conducts information security assessments for organizations and analyzes the events, alerts, alarms and any information that could be useful to identify any threats that could compromise the organization.
Role of information security auditor
this position is in charge of testing the effectiveness of computer information systems, including the security of the systems and reports their findings.
Security Program
Evaluate, create teams, baselines, identify and model threats, uses cases, risk, monitoring and control.