Security Overview Flashcards
Information Security
Act of protecting data and info from unauthorized access, unlawful modification, and disruption, disclosure, corruption, and destruction
Information Security Systems
Protecting the systems that hold the data
CIA Triad
confidentiality, integrity, availability
Confidentiality (CIA Triad)
Info has not been disclosed to unauthorized ppl (encryption)
Integrity (CIA triad)
info hasn’t been altered or modified without proper authorization (hashes)
Availability (CIA Triad)
Info is able to be accessed, stored, and protected at all times
AAAs of Security
Authentication, Authorization, Accounting
Authentication (AAA of security)
persons identity is established with proof and confirmed by a system
5 Methods of Authentication
- Something you know (user/pass)
- Something you are (retina scan/fingerprint)
- Something you have (token, drivers license)
- Something you do (speak, signature)
- location
Authorization (AAA of security)
occurs when a user is given access to certain part of something
Accounting (AAA of security)
tracking of data, computer usage, network resource
Non-repudiation
Proof that someone has taken action
Security threats
Malware, unauthorized access, system failure, social engineering
Malware
malicious software (worms, virus, trojan horse, etc)
Unauthorized access
occurs when access to computer resources and data happens without consent of the owner
System Failure
BSOD - blue screen of death
Social engineering
act of manipulating a user into revealing confidential info performing other detrimental actions
Mitigating Threats
Physical Controls
Technical Controls
Admin Controls
Physical Controls
alarm systems, locks, fences, doors, badges/id cards, security guards
Technical Controls
smart cards, encryption, access control lists (ACLs), intrusion detection systems (IDS), network authentication
Admin Controls (Managerial Controls)
policies, procedures, security awareness, contingency, disaster recovery plans (user training is most cost effective)
2 Categories of Admin Controls
User procedural controls - org choses to do on its own
Legal/Regulatory - required by law (HIPAA)
White Hat
non-malicious hackers who attempt to break into a company’s system at their request (internal/contractors) - penetration testers/ethical hackers