1/58
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
information security
act of protecting data and information from unauthorized access, unlawful modification, disruption, disclosure, corruption, and destruction
information systems security
act of protecting the systems that hold and process the critical data
information security vs information systems security
protecting the data vs devices that hold the data
CIA triad
confidentiality
integrity
availability
confidentiality
ensures information is only accessible to those with the appropriate authorization
integrity
ensures data remains accurate and unaltered unless modification is required
availability
ensures information and resources are accessible and functional when needed by authorized users
CIANA pentagon
extension of CIA triad with the inclusion of:
non-repudiation
authentication
non-repudiation
guaranteeing a specific action/event has taken place and cannot be denied by the parties involved
AAA of security
authenticaiton
authorization
accounting
authentication
process of verifying the indentity of a user or system
authorization
defines what actions/resources a user can access
accounting
act of tracking user activities and resource usage, typically for audit or billing purposes
security controls
measures/mechanisms put in place to mitigate risks and protect the CIA of IS and data
categories of security controls
technical
managerial
operational
physical
types of security controls
preventative
deterrent
detective
corrective
compensating
directive
zero trust
security model that operates on the principle that no one, whether inside or outside the organizations, should be trusted by default
how to acheive zero trust
control plane
data plane
what does the control plane consist of
adaptive identity
threat scope reduction
policy-driven access control
secured zones
what does the data plane focus on
subject/system
policy engine
policy admin
establishing policy enforcement points
threat vs vulnerability
external sources vs internal factors
where does the risk to enterprise systems and networks lie
the intersection of threats and vulnerabilities
importance of confidentiality
protect personal privacy
maintain business advantage (proprietary data)
achieve regulatory compliance (data protection regulations)
5 methods to esure confidentiality
encryption
access controls
data masking
physical security measures
training/awareness
data masking
obscuring data within a database to make it inaccessible for unauthroized users while retaining the real data’s authenticity
ex. only last 4 digits of credit card can be seen
importance of integrity
ensure data accurracy
maintain trust
ensure system operability
5 methods to ensure integrity
hashing
digital signatures
checksums
access controls
regular audits
hash digest
digital fingerprint to prove data integrity;
result of hashing function
checksums
method to verify the integrity of data during transmission
checksum is sent from sender to reciever for verification
availability status
based on number of nines
3 nines = 99.9%
5 nines = 99.999%
5 nines is gold standard
more 9 = less downtime
4 types of redundancy to ensure availability
server: multiple servers in a load balance
data: storing data in multiple places
network: if one network fails, the data can travel through another route
power: backup power sources
non-repudiation
providing undeniable proof in digital transactions
digital signature
hashing amessage to be digitally signes and encrypting the hash digest with the user’s private key using asymmetric encryption
importance of non-repudiation
confirm authenticity of digital transactions
ensure integrity
provide accountability
5 commonly used authentication methods
something you know (knowledge factor): info a user can recall
something you have (possession factor): physical item for authentication
something you are (inherence factor): unique physical or behavioral characteristic of the person to validate they are who they claim to be
something you do (action factor): relies on the user conducting a unique action to prove who they are
somewhere you are (location factor): relies on the user’s location before access is granted
authorization
permissions and privileges granted to users or entities after they have been authenticated
recommended accounting system
audit trail
regulatory compliance
forensic analysis
resource optimization
user accountability
audit trail
provides a chronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to the specific user or point in time
regulatory compliance
maintains a comprehensive record of all the users’ activities
forensic analysis
uses detailed accounting and event logs that can help cybersecurity experts understand what and how an incident occurred and how to prevent similar events from occurring again in the future
resource optomization
organizations can optimize system performance and minimize consts by tracking resource utlization and allocation decisions
user accountability
thorough accounting system ensures users’ actions are monitored and logged, deterring potential misuse and promoting adherence to the organization’s policies
techonologies used in accounting
syslog servers: aggregate logs from various network devices/systems for sys admin
network analysis tools: capture and analyze network traffic for net admin
Security Information and Event Management (SIEM): provides real-time analysis of security alerts generated by various hw/sw infrastructures in an organization
4 categories of security controls
technical: hw/sw implemented for risk management
managerial: strategic planning and governance
operational: procedures designed to protect data on a day-to-day basis and are governed by internal processes and human actions
physical: real-world measures taken to protect assets
6 types of security controls
preventative
deterrent
detective
corrective
compensating
directive
deterrent controls
aim to discourage potential attackers by making the effort seem less appealing or more challenging
ex. ADT warning signs (not the system itself)
compensating controls
alternative measures that are implemented when primary security controls are not feasible or effective
directive controls
guide/form/mandate actions
often rooted in policy or documentation and set the standards for behavior within an organization
2 planes of zero trust architecture
control: policies and procedures
data: enforce the policies and procedures
elements of the control plane (zero trust)
adaptive identity
threat scope reduction
policy-driven access control
secured zones
adaptive identity
rely on real-time validation that takes into account the user’s behavior, device, location, etc
constantly adapting to the environment to adjust accordingly
threat scope reduction
limit the users’ access to only what they need for their work tasks because this drastically reduces the network’s potential attack surface
policy-driven access control
developing, managing, and enforcing user access policies based on their roles and responsibilities
secured zones
isolated environments within an network that are designed to house sensitive data
only users with permissions can access these zones certain
how the control plane makes decisons about access (zero trust)
policy engine: cross references the access request with its predefined policies
policy administrator: establishes and manages the access policies
elements of the data plane (zero trust)
subject/system: entity attempting to gain access
policy enforcement point: allow or restrict access
gap analysis
process of evaluating the differences between an organization’s current performance and its desired performance
2 types of gap analysis
techical: evaluating and identifying lack/weakness in technical capabilities required to utilize security solutions
business: evaluating and identifying weaknesses in business processes required to utilize cloud-based solutions
plan of actiona and milestones (POA&M)
based on gap analysis findings
outlines the specific measures to address each vulnerability, allocate resources, and set up timelines for each remdiation task that is needed