Fundamentals of Information Security - D430

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/121

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

122 Terms

1
New cards

The CIA Triad

Confidentiality, Integrity, Availability

2
New cards

Confidentiality

the principle of keeping information secret and protected from unauthorized access ensuring that data is only accessible to authorized individuals.

3
New cards

Integrity

The assurance that information is accurate and trustworthy, protecting it from unauthorized modification or destruction.

4
New cards

Availability

The principle that information and resources are accessible to authorized users when needed, ensuring that systems operate reliably and without interruption.

5
New cards

The Parkerian Hexad

An expansion of the CIA Triad that includes six properties: confidentiality, integrity, availability, possession, authenticity, and utility.

6
New cards

Possession

Preventing unauthorized control of information, such as a stolen laptop (similar to confidentiality)

7
New cards

Authenticity

Verifying data is genuine and coming from a genuine source (similar to Integrity)

8
New cards

Utility

Ensuring information is useful (similar to Availability)

9
New cards

AAA

An information security framework for managing and securing access to resources through Authentication, Authorization, and Accounting.

10
New cards

Authentication (AAA)

The process of verifying the identity of a user via the process of logging into a system or service, typically through credentials like a username and password.

11
New cards

Authorization (AAA)

Determines what a user has the authority to do and have access to.

12
New cards

Accounting (AAA)

Tracks and records user access and actions with system logs

13
New cards

FISMA

Federal Information Security Management Act enacted in 2002 to promote the security of federal information systems.

14
New cards

HIPAA

Health Insurance Portability Accountability Act that establishes standards for protecting sensitive patient data and ensuring continuity of health insurance coverage.

15
New cards

GLBA

Gramm-Leach-Bliley Act that mandates financial institutions to explain their information-sharing practices and to safeguard sensitive data.

16
New cards

PCI-DSS

Payment Card Industry Data Security Standard, a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.

17
New cards

Identification

An assertion of who we are, such as username, fingerprint, or account numbers.

18
New cards

Authentication

The set of methods used to establish whether a claim of identity is true, usually by something you know, something you are, something you have, something you do, and where you are.

19
New cards

Examples of “something you know”

Passwords and PINs.

20
New cards

Examples of “something you have”

Physical tokens, smart cards, or mobile devices used for authentication.

21
New cards

Examples of “something you are”

Physical characteristics such as fingerprints, facial recognition, or iris patterns.

22
New cards

Examples of “something you do”

Behaviors or actions used for authentication, such as typing patterns or voice recognition.

23
New cards

Examples of “where you are”

Geolocation data, IP address, or GPS coordinates.

24
New cards

Access Control

How we control access to our assets. Broken down into 6 categories, including Preventive, Detective, Corrective, Recovery, Deterrent, and Compensating.

25
New cards

Preventive Controls

Prevents actions from occurring, examples include background checks and drug tests.

26
New cards

Detective Controls

Send alerts during or after an attack. Examples include a building alarm triggered during a break in or intrusion detection system (IDS) alerting to an attack

27
New cards

Corrective Controls

Correct a damaged system or process. Examples include Anti virus that can delete malicious software or an intrusion prevention system (IPS) that can stop a network attack by blocking it.

28
New cards

Recovery Controls

Restores systems after a security incident. Examples include data backups and disaster recovery plans that ensure business continuity.

29
New cards

Deterrent Controls

Designed to discourage security incidents. Examples include security cameras and warning signs that indicate surveillance or enforcement.

30
New cards

Compensating Controls

Add additional security. Defense in depth, multiple layers of security combined.

31
New cards

Physical Access Controls

Security measures that restrict access to physical locations and assets. Examples include locks, access cards, and biometric scanners.

32
New cards

Logical Access Controls

Security measures that manage access to systems and data. Examples include passwords, user authentication, and role-based access permissions.

33
New cards

Mandatory Access Control (MAC)

Strictest of all access control models. Both subjects and objects are given security labels that dictate access levels. Used by the government and military.

34
New cards

Discretionary Access Control (DAC)

Every object has an owner, and the owner decides who gets access. It is less restrictive than mandatory access control. Most common type of access control model.

35
New cards

Role and Rule Based Access Control (RBAC)

Access control method that assigns permissions based on roles and rules defined by the organization. Used in medium to large business environments.

36
New cards

Attribute Based Access Control

Similar to Role and Rule based, but instead of using factors like roles, it uses attributes of the user, resource, and environment to determine access permissions. This allows for more granular and dynamic control over access rights.

37
New cards

Privileged Access

Control that gives users elevated permissions, enabling them to perform specific actions beyond those of standard users. Often used for system administrators or IT personnel.

38
New cards

Sandbox

A controlled environment used for testing and securely executing untrusted applications or code, without affecting the host system.

39
New cards

Defense in Depth

A security strategy that uses multiple layers of defense to protect information systems, ensuring that if one layer is compromised, additional layers still provide protection.

40
New cards

Non-Repudiation

Used to prevent an entity from denying an action took place by using digitally signed documents and auditing system logs.

41
New cards

Data at Rest

Data that’s stored on a storage device that isn’t being transmitted over a network or in use.

42
New cards

Data in Motion

Data that’s currently moving across the network from one device to another. It is vulnerable to interception or unauthorized access during transmission.

43
New cards

Data in Use

Data that’s being used by a system process, application, or user. It’s either being created, updated, or erased. This is the most difficult data to protect because it is being modified and therefore cannot be encrypted.

44
New cards

IT Audit

A formal evaluation of an organization's information systems, ensuring compliance with internal and external standards, effectiveness, and security controls.

45
New cards

Qualys

Cloud based vulnerability assessment tool

46
New cards

BSA

Business Software Alliance; advocates for the software industry, promoting copyright protections and the adoption of legitimate software.

47
New cards

Cryptography

48
New cards
49
New cards
50
New cards
51
New cards
52
New cards
53
New cards
54
New cards
55
New cards
56
New cards
57
New cards
58
New cards
59
New cards
60
New cards
61
New cards
62
New cards
63
New cards
64
New cards
65
New cards
66
New cards
67
New cards
68
New cards
69
New cards
70
New cards
71
New cards
72
New cards
73
New cards
74
New cards
75
New cards
76
New cards
77
New cards
78
New cards
79
New cards
80
New cards
81
New cards
82
New cards
83
New cards
84
New cards
85
New cards
86
New cards
87
New cards
88
New cards
89
New cards
90
New cards
91
New cards
92
New cards
93
New cards
94
New cards
95
New cards
96
New cards
97
New cards
98
New cards
99
New cards
100
New cards