Secton 2 | Fundamentals of Security Flashcards
OBJECTIVE 1.1 - 1.2
Information Security
Protecting the data.
Act of protecting data and information from unauthorized access, unlawful modification and distruption, disclosure, and corruption, and destruction.
Devices that hold the data.
Information Systems Security
Act of protecting the systems that hold and process the critical data.
Confidentiality
Encryption
Refers to the protection of information from unauthorized access and disclosure.
Ensures that information is only accessible to those with the appropriate authorization.
Protect personal privacy, Maintain a business advantage, Achieve regulatory compliance.
Encrpytion
Process of converting data into code to prevent unauthorized access.
Data Masking
Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users.
Physical Security Measures
Used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.
Training and Awareness
Conducting regular training on the security awareness best practices that employees can use to protect the organization’s sensitive data.
Integrity
Hashing
Integrity verifies the accuracy and trustworthiness of data over the entire lifecycle.
Ensures that data remains accurate and unaltered unless modification is required.
Ensure Data Accuracy, Maintain Trust, Ensure System Operability.
Maintaining data integrity ensures that decisions are made based on correct information and with the expected outcomes.
Hashing
Process of converting data into a fixed-size value
Hash Digest, Digital fingerprint
Digital Signatures
Use encryption to ensure integrity and authenticity
Checksums
Method to verify the integrity of data during transmission
Access Controls
Ensures that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations.
Regular Audits
Involve reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed.
Availability
Making sure that services, systems, and data are always available when they’re supposed to be.
Ensures that information and resources are accessible and functional when needed by authorized users.
99.9 % (3 Nines) or 99.999% (5 Nines)
8,760 hours are available and can only be down for a maximum of 8.76 hours. 99.999% System guarantees a downtime of no more than 5.26 minutes in a year. 99% Uptime (3.5 Days of downtime per year). Ensuring Business Continuity, Maintaining Customer Trust, Upholding an Organization’s Reputation.
Redundancy
Having backup options to ensure uninterrupted service.
Availiability
Duplication of critical components or functions of a system with the intention of enhancing its reliability.
Server Redundancy
Involves using multiple servers in a load balance so that if one is overloaded or fails, the other servers can take over the load to continue supporting end users.
Data Redundancy
Involves storing data in multiple places.
Network Redundancy
Ensures that if one network path fails, the data can travel through another route.
Power Redundancy
Involves using backup power sources to ensure that an organization’s systems remain operational during periods of power distruption or outages within a local service area.
Non-repudiation
Ensuring undeniable proof of your participation in digital interaction.
Focused on providing undeniable proof in digital transactions.
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.
Digital Signatures
Confirming the Authenticity of Digital Transactions, Ensuring Integrity, Providing Accountability.
Authentication
Prevent unauthorized access, Protect user data and privacy.
Something you know, Something you have, Something you are, Something you do, Somewhere you are. Two-factor Authentication (2FA) Two authentication methods. Multi-factor Authentication (MFA) Two or more authentication methods. Mult-Factor Authentication (MFA) Security process that requires users to provide multiple methods of identification to verify their identity.
Process of verifying the identity of a user or system.
Ensure resource validity.
Something You Know, Relies on information that a user can recall (KNOWLEDGE FACTOR). Something You Have, Relies on the user presenting a physical item to authenticate themselves (POSSESSION FACTOR). Something You Are, Relies on the user providing a unique phyiscal or behavioral characteristic of the person to validate that they are who they claim to be (INHERENCE FACTOR). Something You Do, Relies on the user conducting a unique action to prove who they are (ACTION FACTOR). Somewhere You Are, Relies on the user being in a certain geographic location before access is granted (LOCATION FACTOR).