SYO 701 - Andrew Flashcards
Confidentiality
The measure taken to ensure that sensitive information is not disclosed to unauthorized individuals, entities, or processes.
Access Controls: use of Passwords, Bio-metric Verification, access cards.
Encryption: process of encoding information in such a way that only authorized parties can read it. Encryption Key is needed to decrypt and read information.
Secure Communications: Using Secure Protocols like SSL/ TLS for transmitting data to prevent interception by unauthorized entities.
Integrity
Protecting data from unauthorized changes to ensure that it is reliable and correct. Refers to Trustworthiness and accuracy of data.
*Data Accuracy
*Data Consistency
*Data Trustworthiness
Methods used:
*Cryptographic Hash Functions
*Digital Signatures
*Access Controls
Availability
Refers to ensuring that Data, Systems, and Services are accessible to authorized users when needed
The How:
*Fault Tolerance - building systems that can continue operating properly even if some of their components fail
*Backup Systems - regularly backing up data and systems to enable recovery in case of data loss or corruption
The goal is to prevent service disruptions due to system failures, infrastructure problems, or malicious attacks like DDoS
DAD Triade
Opposite of the CIA:
1 - Disclosure - Refers to the unauthorized access and exposure of information
2 - Alteration - Loss of Integrity, where unauthorized changes are made to Data
3 - Denial - Direct attack to Availability. Involves attacks that will take data or systems offline resulting in no access
Zero Trust
Centers on the belief that Organizations should not automatically trust anything inside or outside their perimeter and instead must verify anything and everything trying to connect to its systems before granting access.
*Strict Identity verification
*Least Privilege Access
*Multi-Factor Authentication (MFA)
*Monitor and Log all Traffic
Authentication
Process of verifying the identity of a User, device, or other entity in a computer system. A prerequisite to granting access to resources in a system.
Non Repudiation
Ensures that a party in a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.
*can be implemented using digital signature
*digital signature binds a person to the digital data they send
Authorization
Once a User is Authenticated, the Authorization process determines what that user is permitted to do by matching user or system credentials against an access control list.
Accounting
(Also referred to as Auditing) is ensured by keeping a track of activities. Involves logging and monitoring of User actions.
How:
Activity Tracking - involves collecting data on user activities, such as Login times, duration of sessions, accessed resources, network services used, system changes made, and data transferred (stored in System Log).
Accountability
Principle that ensures individuals or entities are held responsible for their actions within a system
Prerequisites:
Identification, Authentication, Authorization, Accounting > Accountability
Control Categories - Technical
Technical Controls - (aka Logical Security Controls) are mechanisms implemented in hardware, software, or firmware that automate the process of preventing, detecting, and responding to security threats.
*Access Controls Mechanisms
*Firewalls
*IDS/ IPS
*Encryption
*Antivirus & Anti-malware Software
*Virtual Private Networks (VPN)
Gap Analysis
An assessment that company’s use to compare their current security posture with a set of standards, best practices, or regulatory requirements to identify areas that need improvement.
Control Categories - Managerial (Administrative)
Policies, Procedures, and guidelines that govern the behavior of people within an Organization and the operation of IT systems
*Security Policies/ Procedures
*Risk Management
*Incident Response and Recovery Plans
*Business Continuity and Disaster Recovery Planning
Control Categories - Operational
Day to Day methods and procedures that are implemented by an organization to ensure and maintain the security of its information and assets.
Performed by People:
*Security Awareness training
*Physical Media Protection
Control Categories - Physical
Measure taken to protect the actual Hardware and Facilities that house the systems, Networks, and Data.
*Lighting
*Signs
*Fences
*Security Guards
*Cameras