Lesson 1: Summarize Fundamental Security Concepts Flashcards
What are the 3 components of the CIA Triad?
- Confidentiality
- Integrity
- Availability
Define ‘Confidentiality’ in the CIA Triad
Keeping data and communications private and protecting them from unauthorized access; data can only be read by people who have explicit authorized access.
Define ‘Integrity’ in the CIA (AIC) Triad
Keeping organizational data accurate, free of errors, and without unauthorized modifications.
Define ‘Availability’ in the CIA Triad
Ensuring computer systems operate continuously and that authorized persons can access data that they need.
Define ‘Non-repudiation’
Goal of ensuring that the party that sent a transmission/created data remains associated with that data and cannot deny sending or creating that data.
Define ‘NIST’ (National Institute of Standards and Technology)?
Develops computer security standards; Publishes cybersecurity best practice and research.
What are the 5 functions of information/cyber security classified by NIST?
- Identify
- Protect
- Detect
- Respond
- Recover
Define the ‘Identify’ function defined by NIST
Evaluating assets, risks, business function, policies, threats/vulnerabilities and recommending security controls/policies to manage them securely.
Define the ‘Protect’ function defined by NIST
Ensures delivery of critical infrastructure services; Supports the ability to limit/contain a potential cybersecurity event.
What are examples of the ‘Protect’ function defined by NIST?
Securing IAM; Security Awareness training; Data protection controls and documentation; Maintenance of assets; Managing protective technology.
Define the ‘Detect’ function defined by NIST
Perform ongoing monitoring ensuring controls are effective and capable of protecting against new types of threats; Enables timely discovery of cybersecurity events.
What are examples of the ‘Detect’ function defined by NIST?
Ensuring Anomalies and Events are detected; Implementing Continuous Monitoring; Maintaining Detection Processes
Define the ‘Respond’ function defined by NIST
Identify, analyze, contain, and eradicate threats to systems and data security.
What are examples of the ‘Respond’ function defined by NIST?
Managing communications with stakeholders and law enforcement; Analysis of incidents; Mitigation to prevent expansion and for resolution;
Define the ‘Recover’ function defined by NIST
Implementing resilience to restore systems/services/data if other functions are unable to prevent attacks; Supports timely recovery to normal operations.
What are examples of the ‘Recover’ function defined by NIST?
Implementing recovery processes to restore systems; Implement improvements based on lessons learned and review of strategy.
How are NIST or other framework functions achieved?
By implementing security controls.
Define a ‘Security Control’
A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA/AIC)
What is the purpose of a cybersecurity framework?
Guides selection and configuration of security controls; Gives structure to risk management and provides externally verifiable statement of regulatory compliance.
What are the outcomes of an organization following a cybersecurity framework?
Allows an organization to asses current cybersecurity capabilities, identify a target level of capability, and prioritize investments to achieve targets.
Define ‘Gap Analysis’
Measures the difference between the current and desired system state(s) to help assess the scope of work included in a project.
What is the purpose of access controls?
Ensure that information system meets the goals of the CIA triad by governing how subjects interacts with objects.
Define a ‘Subject’
Something that can request and be granted access to a resource; Person, Service/Process.