Security Principles Flashcards
CIA Triad
Confidentiality, Integrity and Availability
Confidentiality
The characteristic of data or information when it is not made available or disclosed to unauthorized persons or processes.
Personal Identifiable Information (PII)
Any information that can be used to distinguish or trace an individual’s identity and any other information that is linked or linkable to an individual, such as medical, educational, financial and employment information.
Classified or Sensitive Information
Information that has been determined to require protection against unauthorized disclosure and is marked to indicate its classified status and classification level when in documentary form.
Sensitivity
A measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection.
Integrity
The property of information whereby it is recorded, used and maintained in a way that ensures its completeness, accuracy, internal consistency and usefulness for a stated purpose.
Data Integrity
The property that data has not been altered in an unauthorized manner. Data integrity covers data in storage, during processing and while in transit.
System Integrity
The quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental.
State
The condition an entity is in at a point in time.
Baseline
A documented, lowest level of security configuration allowed by a standard or organization.
Authentication
Access control process validating that the identity being claimed by a user or entity is known to the system, by comparing one (single-factor or SFA) or more (multi-factor authentication or MFA) factors of identification.
Thee common methods of authentication:
Something you know (Knowledge-based), Something you have (Token-based), Something you are(Carachteristic-based).
Example of a something you know authentiction method
Passwords or paraprhrases.
Example of a something you have authentication method
Tokens, memory cards, smart cards
Example of a something you are authentication method
Biometrics, measurable characteristics
Token
A physical object a user possesses and controls that is used to authenticate the user’s identity.
Biometrics
Biological characteristics of an individual, such as a fingerprint, hand geometry, voice, or iris patterns.
Non-repudiation
The inability to deny taking an action such as creating information, approving information and sending or receiving a message.
Privacy
The right of an individual to control the distribution of information about themselves.
Asset
Anything of value that is owned by an organization. Assets include both tangible items such as information systems and physical property and intangible assets such as intellectual property.