SY0-701: 1.0 (General Security Concepts) Flashcards
CIA Triad (1.2)
Confidentiality (Encryption), Integrity (Hashes), Availability (Info is stored, accessed, and protected and all times)
Confidentiality (1.2)
Protection of information from unauthorized access and disclosure via:
Encryption
Access Controls
Data Masking
Physical Security Measures
Training and Awareness
Encryption (1.2)
Process of converting data into code to prevent unauthorized access
Access Controls (1.2)
Ensure only authorized personnel can access certain types of data using user permissions
Data Masking (1.2)
Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users (e.g. first part of credit card is masked with “X’s”)
Physical Security Measures (1.2)
Used to ensure confidentiality for physical types of data (e.g. papers locked in filing cabinet) and for digital information contained on servers and workstations (e.g. biometric access, smart card access, locked server rooms)
Training and Awareness (1.2)
Conducting regular training on the security awareness best practices that employees can use to protect the organization’s sensitive data
Integrity (1.2)
Helps to ensure information and data remain accurate and unchanged from their original state unless intentionally modified by an authorized individual in order to:
Ensure data accuracy
Maintain trust
Ensure system operability
Hashing (1.4)
One-way cryptographic function that takes an input and produces a unique message digest as its output (hash value is known as a hash digest which serves as a digital fingerprint)
Digital Signatures (1.2)
Uses encryption to ensure integrity and authenticity
Checksums (1.2)
Method to verify the integrity of data during transmission
Access Controls (1.2)
Ensure that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations
Regular Audits (1.2)
Involves systematically reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed
Availability (and how it’s measured) (1.2)
Used to ensure that information, systems, and resources are accessible and operational when needed by authorized users in order to:
Ensure business continuity
Maintain customer trust
Upholding an organizations reputation
(3 Nines = 99.9% uptime; 5 nines is gold standard)
Redundancy (1.2)
Duplication of critical components or functions of a system with the intention of enhancing its reliability:
Server redundancy
Data redundancy
Network redundancy
Power redundancy
Server Redundancy (1.2)
Using multiple servers in a load balance so that if one is overloaded or fails, the other servers can take over the load
Data Redundancy (1.2)
Storing data in multiple places (RAID, cloud-based backups
Network Redundancy (1.2)
Ensures that if one network path fails, the data can travel through another route
Power Redundancy (1.2)
Using backup power sources to ensure that an organization’s systems remain operational during periods of power disruption or outages within a local service area
Non-Repudiation (1.2)
Focuses on providing undeniable proof in digital transactions (e.g. Digitally signing email) in order to:
Confirm the authenticity of digital transactions
Ensure integrity of critical communications
Provide accountability
Digital Signature (1.2)
Non-Repudiation; Created by first hashing a particular message or communication to be digitally signed and encrypting the hash digest with the user’s private key using asymmetric encryption
AAA (1.2)
Authentication (Prove your identity), Authorization (Allowed to have access), Accounting (Data tracking, e.g. log file)
Authentication (1.2)
Security measure that ensures individuals or entities are who they claim to be during a communication or transaction
5 Methods of Authentication (1.2)
Something you Know (Knowledge Factor; Name/Password)
Something you have (Possession Factor; Smart Card)
Something you are (Inherence Factor; Biometrics)
Something you do (Action Factor; Typing/Speaking pattern)
Somewhere you are (Location Factor)
2FA / MFA (1.2)
Two-Factor Authentication / Multi-Factor Authentication (2 or more authentication factors)
Authorization (1.2)
Permissions and privileges granted to users or entities after they have been authenticated
Accounting (1.2)
Security measure that ensures all user activities are properly tracked and recorded in order to:
Provide audit trail
Gain regulatory compliance
Perform forensic analysis
Optimize resources
Maintain user accountability
Audit Trail (1.2)
Provides a chronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to a specific user or point in time
Regulatory Compliance (1.2)
Maintains a comprehensive record of all the users activities
Forensic Analysis (1.2)
Uses detailed accounting and event logs that can help cybersecurity experts understand what happened, how it happened, and how to prevent similar incidents from occurring again in the future
Resource Optimization (1.2)
Organizations can optimize system performance and minimize costs by tracking resource utilization and allocation decisions
Maintain User Accountability (1.2)
Thorough accounting system ensures users actions are monitored and logged, deterring potential misuse and promoting adherence to the organization’s policies
Syslog Server (1.2)
Used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies in the organization
Network Analyzers (1.2)
Used to capture and analyze network traffic to gain detailed insights into all the data moving within a network
SIEM (1.2)
Security Information and Event Management
Provides real-time analysis of security alerts generated by various hardware and software infrastructure in an organization
Security Control Categories (1.1)
Technical Controls
Administrative/Managerial Controls
Operational
Physical Controls
Technical Controls (1.1)
The technologies, hardware, and software mechanisms that are implemented to manage and reduce risks (antivirus, firewalls, encryption processes, intrusion detection systems, etc.)
Administrative/Managerial Controls (1.1)
Involves the strategic planning and governance side of security (policies, procedures, security awareness training, disaster recovery plans)
Operational Controls (1.1)
Procedures and measures that are designed to protect data on a day-to-day basis and are mainly governed by internal processes and human actions (password change requirements, backup procedures, account reviews)
Physical Controls (1.1)
Tangible, real-world measures, taken to protect assets (fences, shredding documents, security guards, door locks, surveillance cameras)
Security Control Types (1.1)
Preventative
Deterrent
Detective
Corrective
Compensating
Directive
Preventative Controls (1.1)
Proactive measures implemented to thwart potential security threats or breaches (e.g. firewalls)
Deterrent Controls (1.1)
Aim to discourage potential attackers by making the effort seem less appealing or more challenging (alarm system signs/warning signs)
Detective Controls (1.1)
Monitor and alert organizations to malicious activities as they occur or shortly thereafter (antivirus in detection mode, security cameras, alarm systems)
Corrective Controls (1.1)
Mitigate any potential damage and restore the systems to their normal state (antivirus in quarantine/removal mode)
Compensating Controls (1.1)
Alternative measures that are implemented when primary security controls are not feasible or effective (WPA2 w/ VPN if WPA3 isn’t available)
Directive Controls (1.1)
Often rooted in policy or documentation and set the standards for behavior within an organization (Acceptable Use Policy- AUP)
Gap Analysis (1.2)
Process of evaluating the differences between an organization’s current performance and its desired performance
Gap Analysis Steps (1.2)
- Define the scope of analysis
- Gather data on the current state of the organization
- Analyze the data to identify gaps
- Develop a plan to bridge the gap
Gap Analysis Types (1.2)
Technical Gap Analysis
Business Gap Analysis
Technical Gap Analysis (1.2)
Involves evaluating an organizations current technical infrastructure and identifying any areas where it falls short of the technical capabilities required to fully utilize its security solutions
Business Gap Analysis (1.2)
Involves evaluating an organizations current business processes and identifying any areas where they fall short of the capabilities required to fully utilize the solutions
POA&M (1.2)
Plan Of Action & Milestones: Outlines the specific measures to address each vulnerability, allocate resources, and set up timelines for each remediation task that is needed
Zero Trust (1.2)
Security Model that operates on the principle that no one, whether inside or outside the organization, should be trusted BY DEFAULT
Zero Trust- Planes (1.2)
Control Plane
Data Plane
Zero Trust- Control Plane (1.2)
The overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization
Zero Trust- Control Plane Key Elements (1.2)
Adaptive Identity
Threat Scope Reduction
Policy-driven access control
Policy Administrator
Policy Engine
Adaptive Identity (1.2)
Use adaptive identities that rely on real-time validation that takes into account the user’s behavior, device, location, and more (entering current password in order to change password)
Threat Scope Reduction (1.2)
Limit the users access to only what they need for their work tasks because this drastically reduces the network’s potential attack surface
Policy-driven access control (1.2)
Entails developing, managing, and enforcing user access policies based on their roles and responsibilities
Secured Zone (1.2)
Isolated environments within a network that are designed to house sensitive data
Policy Administrator (1.2)
Used to establish and manage the access policies
Policy Engine (1.2)
Cross-reference the access request with its predefined policies
Data Plane (1.2)
Implicit trust zones
Subject/System
Policy Enforcement Point
Implicit trust zones (1.2)
Area of network where all communications are implicitly trusted
Subject/System (1.2)
Refers to the individual or entity attempting to gain access
Policy Enforcement Point (1.2)
Allow, restrict, or deny access; it will effectively act as a gatekeeper to the sensitive areas of the systems or networks
Deception and Disruption Technologies (1.2)
Designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats
Honeypots
Honeynets
Honeyfiles
Honeytokens