Section 1 Flashcards
Threat
Anything that could cause harm, loss, damage, or compromise to our information technology systems
Ex.
Natural disasters
Cyber-attacks
Data integrity breaches
Disclosure of confidential information
Vulnerability
Any weakness in the system design or implementation
Ex.
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security
Threat and Vulnerability
Threat + Vulnerability = Risk
Confidentiality
Refers to the protection of information from unauthorized access and disclosure
Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes
THINK ENCRYPTION
Encryption
Process of converting data into a code to prevent unauthorized access
Integrity
Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
Verifies the accuracy and trustworthiness of data over the entire lifecycle
THINK HASHING
Hashing
Process of converting data into a fixed-size value
Availability
Ensure that information, systems, and resources are accessible and operational when needed by authorized users
Redundancy
Duplication of critical components or functions of a system with the intention of enhancing its reliability
Non-repudiation
Focused on providing undeniable proof in the world of digital transactions
THINK DIGITAL SIGNATURES
Digital Signatures
Considered to be unique to each user who is operating within the digital domain
Authentication
Security measure that ensures individuals or entities are who they claim to be during a communication or transaction
-Knowledge Factor
-Possession Factor
-Inherence Factor
-Action Factor
-Location Factor
Multi-Factor Authentication System (MFA)
Security process that requires users to provide multiple methods of identification
to verify their identity
Accounting
Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded
-Syslog Servers
-Network Analysis Tools
Security Information and Event Management Systems
Authorization
Pertains to the permissions and privileges granted to users or entities after they have been authenticated