Security + Flashcards
Information Security
Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction
Information Systems Security
Act of protecting the systems that hold and process the critical data
C.I.A. Triad
Confidentiality, Integrity, Availability
Confidentiality
Ensures that information is only accessible to those with the appropriate authorization
Integrity
Ensure that the data remains accurate, unaltered, and trustworthy unless modifications required
Availability
Ensures that information and resources are accessible and functional when needed by authorized users
Non-repudiation
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved
AAA Security
Authorization, Authentication, Accounting
Control Plane
The overarching framework and set of components are responsible for defining, managing, and enforcing the policies related to user and system access within an organization.
Consists of adaptive identity, threat scope reduction, policy-driven access control, and secured zones.
Data Plane
Ensures that the policies and procedures are properly executed.
Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points
Hashing
Process of converting data into a fixed-size value
Checksum
Method to verify the integrity of the data during transmission
Regular Audits
Involve reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed
Digital Signature
Created first by hashing a particular message or communication to be digitally signed and encrypting the hash digest with the user’s private key using asymmetric encryption
Managerial Controls
Involve the strategic planning and governance side of security
Operational Controls
Procedures and measures that are designed to protect data on a day-to-day basis and are mainly governed by internal processes and human actions
Physical Controls
Tangible real-world measures taken to protect assets
Preventative Controls
Proactive measures implemented to thwart potential security threats or breaches
Deterrent Controls
Aim to discourage potential attackers by making the effort seem less appealing or more challenging
Detective Controls
Monitor and alert organizations to malicious activities as the occur or shortly thereafter
IDS
Intrusion Detection System
Corrective Controls
Mitigate any potential damage and restore the systems to their normal state
Compensating Controls
Alternative measures that are implemented when primary security controls are not feasible or effective
Directive Controls
Policies or procedures that dictate specific actions or behaviors by users or systems.
Often rooted in policy or documentation and set the standards for behavior within an organization
Gap Analysis
Process of evaluating the differences between an organization’s current performance and its desired performance
Technical Gap Analysis
Involves evaluating an organization’s current technical infrastructure and identifying any areas where it falls short of the technical capabilities required to fully utilize their security solutions
Business Gap Analysis
Involves evaluating an organization’s current business processes and identifying any areas where they fall short of the capabilities required to fully utilize cloud-based solutions
POA&M- Plan of Action and Milestones
Outlines the specific measures to address each vulnerability, allocate resources, and set up timelines for each remediation task that is needed
Control Plane
Adaptive Identity
Use adaptive identities that rely on real-time validation that takes into account the user’s behavior, device, location, and other factors like that