Module 1 Flashcards
CIA Triad
Confidentiality, Integrity, Availability
Availability
The quality of being able to be used or obtained.
Availability concerns occur when operating systems, equipment, and data are not functioning correctly, limiting access to those who need it.
Integrity
The quality of being honest, whole, or undivided.
The integrity of info refers to protecting info from being modified by unauthorized parties.
Hashing is a big word for this, if you see hashing it is almost always due to integrity.
Confidentiality
The state of being kept secret or private. Ensuring that sensitive info does not reach unauthorized people.
“Need to know base”
A hospital only allows authorized healthcare personnel within one department to access patient Personal Identifiable Information. When employees move to another department, they lose access.
Confidentiality
A cybercriminal launches a DDoS attack that floods a website with unwanted traffic from multiple computers and takes the site offline.
Availability
A cybercriminal cracks a hashed message and changes its contents.
Integrity
A company’s network infrastructure uses load balancers, which distribute the “load” of tasks, such as file requests and data routing, to a variety of servers. This ensures that no single device is overburdened.
Availability
Employees need key cards in order to enter their company offices.
Confidentiality
Brute Force Attack
An Attacker can use brute force attack to continuously attempt username and password combos.
How to mitigate Brute Force
Strong Password Policies: Require complex passwords that must be changed regularly.
Failed Login Attempts:
Implement automatic account lockout after a set number of unsuccessful login attempts to deter brute-force attacks.
Time-Based Lockout:
Consider a temporary lockout period after failed logins, allowing users to retry after a short time.
Phishing
An attacker can attempt a phishing attack, where users are redirected to fake a login pages that capture user credentials.
How to mitigate Phishing
Phishing Training and Awareness Programs: Educate employees about the dangers of phishing and how to recognize fraudulent emails
Security Training:
Regularly educate users about phishing scams, password hygiene, and the importance of protecting their login credentials.
Phishing Simulation Tests:
Conduct periodic phishing simulation exercises to evaluate user awareness and identify areas for improvement.
Keylogging
An Attacker can deploy malware such as keyloggers to capture daily user activity.
How to mitigate Keylogging
Use of Anti-Keylogging Software: Install security software that detects and prevents keyloggers.
Log Analysis:
Regularly review system logs for anomalies that could indicate unauthorized access or malicious activity.
Intrusion Detection/Prevention Systems (IDS/IPS):
Monitor network traffic for suspicious activity and actively block potential threats.