Security Basics Chpt 1 Flashcards
What are examples of Confidentiality Controls?
Encryption, Access Control, Stegonagraphy, Least privilege, Need to know, separation of duties
What are examples of Integrity Controls?
Hashing, Digital Signatures, Backups, Version Control
What are examples of Availability Controls
Redundancy, Fault Tolerance, Patch Management
Fault Tolerance
Systems that continue functioning after components fail
Patch management
Application of software updates with minimal service disruption
Redundancy
Multiple or backup systems designed for immediate or quick recovery
Digital signatures
Hashing and encryption used to prove a file’s origin
Hashing
Digital fingerprints used to detect file alteration
Steganography
Secret messages concealed inside of ordinary ones
What is the Layer Security/Defense Depth
Policies, Procedures & Awareness -> Physical -> Perimeter ->Network -> Host -> App -> Data
What is the Basic Risk Concept Order
Risk -> Threat -> Vulnerability -> Loss/Impact
Risk
the likelihood that a threat will exploit a vulnerability
Risk mitigation
Reduces the chances that a threat will exploit a vulnerability by implementing controls
How do you calculate risk?
threat * vulnerability * Loss(Impact)
What is Attack Surface?
Points where ama attacker can discover/exploit vulnerabilities in a network or application