Security Fundamentals Flashcards
Data
This is a general term that relates to the information assets of a person, customer, or organization. In a computer system, the files are the data.
Three primary goals of information security.
Prevention, Detection, and Recovery
Risk
A concept that indicates exposure to the chance of damage or loss.
Potential threats to computer and network security include:
- Unintentional or unauthorized access or chances to data.
- The interruption of services.
- The interruption of access to assets.
- Damage to hardware.
- Unauthorized access or damage to facilities.
Vunlnerability
Any condition that leaves a system open to harm.
Vulnerabilities can come in a wide variety of forms, including:
- Improperly configured or installed hardware or software.
- Untested software and firmware patches.
- Bugs in software or operating systems.
- The misuse of software or communication protocols.
- Poorly physical security.
- Insecure passwords.
- Design flaws in software or operating systems.
- Unchecked user input.
Intrusions
- Physical intrusions
- Host-based intrusions
- Network-based intrusions
Attacks on a computer systems and network security include:
- Physical security attacks.
- Network-based attacks, included wireless networks.
- Software-based attacks.
- Social engineering attacks.
- Web application-based attacks.
Controls are broadly classified as
prevention, detection, and correction controls.
Prevention controls
These help to prevent a threat or attack from exposing a vulnerability in the computer system.
Detection controls
These help to discover if a threat or vulnerability has entered into the computer system.
Corrections controls
These help to mitigate the consequences of a threat or attack from adversely affecting the computer systems.
The Security Management Process
- Identify security controls
- Implement security controls
- Monitor security controls
CIA Triad
- Confidentially - Keeping information and communication private and protecting them from unauthorized access.
- Integrity - Keeping organization information accurate, free of errors, and without unauthorized modification.
- Availability - ensuring that systems operate continuously and that authorized persons can access the data that they need.
Non-repudiation
The goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data. Non-repudiation is one way to determine accountability.
Identification
A method that ensures that an entity requesting access to resources by using a certain set of credentials is the true owner of the credentials.
Authentication
Is the method of validating a particular entity or individual’s unique credentials.
Authentication Factors
Something you are Something you have Something you know Somewhere you are or are not Something you do
Authorization
The process of determining what rights and privileges a particular entity has.
Access control
The process of determining and assigning privileges to various resources, objects, or data.
Access Controls Models
Mandatory Access controls (MAC)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control
Mandatory Access Control (MAC)
In this model, access is controlled by comparing an object’s security designation and a user’s security clearance. Objects, such as files and other resources, are assigned security labels, depending on the object’s sensitivity.
Discretionary Access Control (DAC)
In this model, access to each object is controlled on a customized basis, which is based on on a user’s identity.
Role-Based Access Control (RBAC)
In this model, users are assigned to predefined roles, and network object are configured to allow access only to specific roles.
Rule-Based Access Control
This is a non-discretionary technique that is based on a set of operational rules or restrictions.