SYO 701 - Jason Dion Flashcards
Information Security
Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction.
*Securing the Data, not the Systems
Information Systems Security
Act of protecting the system that hold and process the critical data
CIA Triad
Confidentiality - ensures that information is only accessible to those with the appropriate authorization.
Integrity - ensured that data remains accurate and unaltered unless modification is required.
Availability - ensures that information and resources are accessible and functional when needed by authorized users
Non Repudiation
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved
AAA of Security
Authentication - Process of verifying the identity of a user or system
Authorization - defines what actions or resources a User can access
Accounting - act of tracking user activities and resource usage, typically for audit or billing purposes
Security Controls
Technical -
Managerial (Administrative) -
Operational -
Physical -
Zero Trust
New Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.
Vulnerability
Any weakness in the system design or implementation
Risk Management
Finding different ways to minimize the likelihood of an outcome occurring and achieve the desired outcomes
Confidentiality
Refers to the protection of information from unauthorized access and disclosure
- Protect personal privacy
- Maintain a business advantage
- Achieve regulatory compliance
Encryption
Process of converting data into code to prevent unauthorized access. Data is scrambled, aka Cypher Text, and can only be viewed using the correct decryption key.
Access Controls
Ensure only authorized personal can access certain types of data
Data Masking
Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data authenticity and use for authorized users
Physical Security Measures
Used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.
Training and Awareness
Conducting regular training on the security awareness best practices that employees can use to protect the organization’s sensitive data