Section 1.2 Flashcards
What is the CIA Triad?
It’s a combination of principles to describe the fundamentals of security.
What does the C, I and A stand for?
C: Confidentiality
- Prevent disclosure of information to unauthorized individuals or systems
I: Integrity
- Messages can’t be modified without detection
A: Availability
- Systems and networks must be up and running
What is Confidentiality?
Definition: Certain information should only be known to certain people
Encryption is used to encode messages so only certain people can read it.
Access control are used to restrict access to resources.
Two-factor authentication is used to confirm the correct user is getting access to the resource
What is Integrity?
Definition: Data is stored and transferred as intended, without any changes.
Hashing is used to compare the hash of the sender with the receiver to make sure the same hash is found.
Digital signatures take hash and encrypts it to verify the integrity of data.
Certificates are used to identify devices/people
What is Availability?
Definition: information is accessible to authorized users
Redundancy: build services that will always be available
Fault tolerance: System should continue to run even when failure occurs
Patching: Ensuring stability and closing security holes
What is non-repudiation?
Non repudiation means that you cannot deny what you’ve done by using proof of integrity and proof of origin with high assurance of authenticity.
What is proof of integrity?
Proof of integrity means that we can verify the data that we received is exactly the same data that was originally sent.
This means that the data remains accurate and consistent.
What is a hash?
A hash is a short string of text that we can create based on data that is contained within the plaintext.
If any of the plaintext data changes, then the hash would also change.
It’s used to verify integrity of the data that was received is the same as the data that was sent.
What is proof of origin?
Proving the source of the message.
Digital signatures are used to verify proof of origin. Digital signatures use a private key that is only known to the person sending the data. To verify the private key, a public key associated with the private key is used.
What is authentication?
Proving you are who you say you are by using username/password or other authentication factors.
What is authorization?
Based on the identification and authentication, what access do you have in the system.
How to authenticate a device?
A digitally signed certificate can be put in the device. VPNs can verify that the device is a company device.
What is a CA?
A Certificate Authority (CA) is a device that manages all of our certificates in our environment.
What is a Gap Analysis?
A gap analysis is a comparison of where we are vs where we want to be.
What does Zero Trust mean?
Zero trust means that you have to authenticate each time you have to get access to a particular resource.
Nothing is trusted and everything needs to be verified.