Section 1-3 Flashcards
What is the definition of Information Security?
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
What does Information Systems Security involve?
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data
What are the three components of the CIA Triad?
- Confidentiality
- Integrity
- Availability
What is the purpose of Confidentiality in the CIA Triad?
Ensures information is accessible only to authorized personnel
What does Integrity ensure in the context of the CIA Triad?
Ensures data remains accurate and unaltered
What is the role of Availability in the CIA Triad?
Ensures information and resources are accessible when needed
Define Non-Repudiation.
Guarantees that an action or event cannot be denied by the involved parties
What does the CIANA Pentagon add to the CIA Triad?
Non-repudiation and authentication
What are the Triple A’s of Security?
- Authentication
- Authorization
- Accounting
What is the definition of Authentication?
Verifying the identity of a user or system
What is Authorization?
Determining actions or resources an authenticated user can access
What does Accounting refer to in security?
Tracking user activities and resource usage for audit or billing purposes
List the categories of Security Control.
- Technical
- Managerial
- Operational
- Physical
What are the types of Security Controls?
- Preventative
- Deterrent
- Detective
- Corrective
- Compensating
- Directive
What principle does the Zero Trust Model operate on?
No one should be trusted by default
What components are involved in the Control Plane of Zero Trust?
- Adaptive identity
- Threat scope reduction
- Policy-driven access control
- Secured zones
What is a Threat?
Anything that could cause harm, loss, damage, or compromise to our information technology systems
Identify examples of Threats.
- Natural disasters
- Cyber-attacks
- Data integrity breaches
- Disclosure of confidential information
What is a Vulnerability?
Any weakness in the system design or implementation
List internal factors that can cause Vulnerabilities.
- Software bugs
- Misconfigured software
- Improperly protected network devices
- Missing security patches
- Lack of physical security
What is Risk Management?
Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome
What is the importance of Confidentiality?
- To protect personal privacy
- To maintain a business advantage
- To achieve regulatory compliance
What are five basic methods to ensure Confidentiality?
- Encryption
- Access Controls
- Data Masking
- Physical Security Measures
- Training and Awareness
What does Integrity ensure?
That information and data remain accurate and unchanged from its original state