Week 1 Notes Review Flashcards
What is Cybersecurity
The collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organizations and users’ assets.
General Security Objectives
Confidentiality
Integrity
Availability
(Integrity includes data authenticity and non-repudiation)
Information Security
refers to the preservation of confidentiality, integrity, and availability of information
(authenticity, accountability, non repudiation and reliability can also be included)
Network Security
protection of networks and their service from unauthorized modification, destruction, or disclosure
Assurance that the network performs its critical functions correctly and tehre are no harmful side effects
Confidentiality
Means that information
that should stay secret stays secret and only those persons authorized to access it may receive access. “
- Seeks to prevent the unauthorized disclosure of information.
- Keeps data secret.
- Seeks to prevent unauthorized read access to data.
- Example: Identity Theft (Personalized Identifiable Information – PII)
CIA Pillar
Info Sec, Governance, Policy -> Management of Info Sec
C - Computer Security
I - Data Security
A - Network Security
Integrity
- Integrity in the information security context refers not only to integrity of information itself but also
to the origin integrity—that is, integrity of the source of information. - Seeks to prevent unauthorized modification of information.
Availability
- Ensures the information / the system is available when needed.
- There won’t be any downtime.
(Example: DDoS Attack Scenario)