principles of security (test)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:36 PM on 11/20/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

14 Terms

1
New cards

Defense in Depth

The use of multiple varied layers of security to protect an organization's systems and data.

2
New cards

CIA Triad

An information security model comprising Confidentiality, Integrity, and Availability.

3
New cards

Confidentiality

The prevention of unauthorized access or misuse of sensitive data.

4
New cards

Integrity

The consistency and trueness of information/data, ensuring it remains unchanged unless authorized.

5
New cards

Availability

The accessibility of data to authorized users when needed.

6
New cards

Principle of Least Privilege

Users should be granted the minimum privileges necessary to perform their duties.

7
New cards

PAM (Privileged Access Management)

The management of the privileges that an access role has within an organization.

8
New cards

PIM (Privileged Identity Management)

Translating a user's role into an access role on a system.

9
New cards

Bell-La Padula Model

A security model that achieves confidentiality based on 'need to know' and uses the rule 'no write down, no read up'.

10
New cards

Biba Model

A security model focusing on integrity with the rule 'no write up, no read down'.

11
New cards

Threat Modelling

The process of reviewing, improving, and testing the security protocols in information systems.

12
New cards

STRIDE

A threat modeling framework that includes six main principles: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.

13
New cards

CSIRT (Computer Security Incident Response Team)

A team that responds to security incidents and manages containment, eradication, and recovery.

14
New cards

Incident Response Phases

Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.

Explore top notes

note
Food Production - 86%
Updated 387d ago
0.0(0)
note
AP Biology Review
Updated 691d ago
0.0(0)
note
Quiz 3 POWPLANT - Reviewer
Updated 483d ago
0.0(0)
note
English 3-4: S2 Final
Updated 579d ago
0.0(0)
note
Chemistry - Matter
Updated 1297d ago
0.0(0)
note
Geometry
Updated 1276d ago
0.0(0)
note
Chapter 35-40 Notes
Updated 1059d ago
0.0(0)
note
Food Production - 86%
Updated 387d ago
0.0(0)
note
AP Biology Review
Updated 691d ago
0.0(0)
note
Quiz 3 POWPLANT - Reviewer
Updated 483d ago
0.0(0)
note
English 3-4: S2 Final
Updated 579d ago
0.0(0)
note
Chemistry - Matter
Updated 1297d ago
0.0(0)
note
Geometry
Updated 1276d ago
0.0(0)
note
Chapter 35-40 Notes
Updated 1059d ago
0.0(0)

Explore top flashcards

flashcards
AP Human Geography Unit 3
63
Updated 688d ago
0.0(0)
flashcards
Formal Commands special verbs
24
Updated 1224d ago
0.0(0)
flashcards
Design T1
32
Updated 1155d ago
0.0(0)
flashcards
italian help
28
Updated 374d ago
0.0(0)
flashcards
3. tétel- Pszichoanalízis
179
Updated 655d ago
0.0(0)
flashcards
AQA GCSE PE
317
Updated 350d ago
0.0(0)
flashcards
GAW words
30
Updated 894d ago
0.0(0)
flashcards
AP Human Geography Unit 3
63
Updated 688d ago
0.0(0)
flashcards
Formal Commands special verbs
24
Updated 1224d ago
0.0(0)
flashcards
Design T1
32
Updated 1155d ago
0.0(0)
flashcards
italian help
28
Updated 374d ago
0.0(0)
flashcards
3. tétel- Pszichoanalízis
179
Updated 655d ago
0.0(0)
flashcards
AQA GCSE PE
317
Updated 350d ago
0.0(0)
flashcards
GAW words
30
Updated 894d ago
0.0(0)