principles of security (test)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Defense in Depth

The use of multiple varied layers of security to protect an organization's systems and data.

2
New cards

CIA Triad

An information security model comprising Confidentiality, Integrity, and Availability.

3
New cards

Confidentiality

The prevention of unauthorized access or misuse of sensitive data.

4
New cards

Integrity

The consistency and trueness of information/data, ensuring it remains unchanged unless authorized.

5
New cards

Availability

The accessibility of data to authorized users when needed.

6
New cards

Principle of Least Privilege

Users should be granted the minimum privileges necessary to perform their duties.

7
New cards

PAM (Privileged Access Management)

The management of the privileges that an access role has within an organization.

8
New cards

PIM (Privileged Identity Management)

Translating a user's role into an access role on a system.

9
New cards

Bell-La Padula Model

A security model that achieves confidentiality based on 'need to know' and uses the rule 'no write down, no read up'.

10
New cards

Biba Model

A security model focusing on integrity with the rule 'no write up, no read down'.

11
New cards

Threat Modelling

The process of reviewing, improving, and testing the security protocols in information systems.

12
New cards

STRIDE

A threat modeling framework that includes six main principles: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.

13
New cards

CSIRT (Computer Security Incident Response Team)

A team that responds to security incidents and manages containment, eradication, and recovery.

14
New cards

Incident Response Phases

Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.