Security Fundamentals Flashcards
What to protect or what information to secure
Data. The information assets
Resources. Virtual or physical system components
Information security refers to
The protection of information resources from unauthorized access, attacks, thefts, or data damage
The three primary goals of security
Prevention. Prevent users gaining unauthorized access to confidential information.
Detection. Users discovered trying to access unauthorized data
Recovery. Employ a process to recover vital data
In terms of security what is collateral damage
Compromised reputation, loss of goodwill, reduce investor confidence, loss of customers and financial losses.
Risk is
Exposure to the chance of damage or loss. The likelihood of a hazard or threat occurring. Associated with the loss of a system, power, or network.
A threat is
Any action that could cause damage to an asset.
Some potential threats to computer and network security
Unauthorized access or changes to data Interruption of services Interruption of access to assets Damage to hardware Unauthorized access or damage to facilities
A vulnerability is
Any condition that leaves a system open to harm
List some vulnerabilities in terms of security
Improperly configured or installed hardware or software Untested software or firmware patches Bugs in software or OS misuse of software or communication protocols Poorly designed networks Poor physical security Insecure passwords Design flaws in software or OS Unchecked user Input
An intrusion occurs when
An attacker accesses a computer system without the authorization. Occurs when the system is vulnerable to Attacks.
Three types of intrusions
Physical
Host-based
Network-based
An attack is
Exploit a vulnerability in a system without the authorization
Attacks on a computer system and network security include
Physical Network-based Software-based Social engineering Web application-based
Controls are
The countermeasures (solutions and activities) put in place to avoid, mitigate, or counteract security risks due to threats or attacks.
Type of controls
Prevention controls
Detection controls
Correction controls
Prevention controls help to
Prevent a threat or attach from exposing a vulnerability
Detection controls help to
Discover If a threat or vulnerability has entered the computer system
Correction controls help to
Mitigate the consequences of a threat or attack from adversely affecting the computer system
The security management process involves
Identify security controls detect problems and determine how to protect a system
Implement security controls installing control mechanisms to prevent problems in a system
Monitor security controls detecting and solving security issues that arise
Information security seeks to address three specific principles
Confidentiality
Integrity
Availability
Confidentiality is the fundamental principle of
Keeping information and communication private and protecting them from unauthorized access
Integrity is the fundamental principle of
Keeping organization information accurate, free of errors, and without unauthorized modifications.
Confidentiality is typically controlled through
Encryption, access controls and steganography
Integrity is typically controlled through
Hashing, digital signature, certificates, and non-reputation.