Security Principles Flashcards
CC Domain 1, including the foundational concepts of cybersecurity.
Confidentiality
is the secrecy of the information within the asset being protected. Confidentiality is the most common form of protection that cyber criminals seek to compromise.
Access controls
are processes, tools, or configuration settings that ensure that access to data is restricted to only those individuals who are authorized to access it.
Access controls are mechanisms to ensure that only those persons or resources who are specifically authorized to access an information resource are allowed to have such access.
Cryptography
makes data unreadable except to authorized persons and protects the confidentiality of data while the data is at rest (in storage) or while it is being transmitted.
Integrity
data is not being altered or corrupted in any way
hashes
which is a technique to detect if the contents of a data file or any data set have been altered from their original source.
Availability
vailability attacks are commonly known as denial of
service (DoS) attacks,
Threat actors
are cyber criminals who seek to compromise the confidentiality, integrity, oravailability of these information assets.
Authentication
is the method by which systems verify that a user who is
requesting access to a resource really is who they claim to be.
Nonrepudiation
guarantee that a sender of a message cannot later deny that they sent the message
Information assurance
refers to the measure of information security goal of information assurance is to verify and ensure the confidentiality, integrity, and availability of data and assets, and this can only be done by
measuring the effectiveness of security controls.
Conduct Research
The first step the cyber criminal performs in an attack is to gather as much information as possible about the target to be able to carry out the attack.
Identify Targets
During this phase the attacker tries to identify the organization’s
information assets as well as their corresponding vulnerabilities that can be exploited
Exploit Targets
Once the targets are identified, the attacker can design and execute the attack. This involves probing and taking advantage of specific
vulnerabilities with the goal of gaining unauthorized access to the
enterprise.
Do Bad Things
Once the attacker gains access, they can do a variety of things to achieve their objective. Usually, the attacker attempts to expand access laterally throughout the network to explore and discover more systems and data to gain deeper access and perform more attacks.
Risk Management
is the term used to describe the discipline of how an organization chooses and implements the right level of security that is appropriate for them and their situation or business.
Risk Identification
identify the potential threats the organization may face and document in risk ledger.