Terms & Concepts Flashcards
What is the CIA triad?
CIA stands for confidentiality, integrity and availability.
Define the “C” in the CIA triad?
“C” stands for confidentiality.
Sensitive information is only accessible by authorized individuals.
Define the “I” in the CIA triad.
“I” stands for integrity.
Maintaining the accuracy and completeness of data.
Define the “A” in the CIA triad.
“A” stands for availability.
Information and resources should be available to authorized individuals when needed.
What is the principle of least privilege?
Granting users the minimum level of access (or permissions) necessary to perform their job functions.
Explain “defense in depth”.
Implementing multiple layers of security controls to protect information and resources, so that if one layer fails, others still provide protection.
Explain “zero trust”.
A security model that assumes no implicit trust, verifying every access request as though it originates from an open network.
Define RBAC.
RBAC stands for role-based access control.
Assigning permission to users based on their role within an organization.
Define ABAC.
ABAC stands for attribute-based access control.
Granting access based on user attributes (eg. department, location) and environmental conditions.
Explain multi-factor authentication (MFA).
MFA involves requiring two or more verification factors to authenticate a user, enhancing security beyond just passwords.
Explain single sign-on (SSO).
Allowing users to authenticate once and gain access to multiple systems without re-entering credentials.
Explain privileged access management (PAM).
Controlling and monitoring accounts with elevated permissions to reduce the risk of misuse.
Define “federation”.
Federation is linking a user’s identity across multiple identity management systems, often used for SSO across organizations.
Explain identity lifecycle management.
Managing user identities from creation to deactivation, including onboarding, role changes, and offboarding.
Explain third-party risk assessment.
Evaluating the security posture of vendors who have access to your systems or data.