Section 2 Security+

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

flashcard set

Earn XP

Description and Tags

Fundamentals of Security

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

Information Security

Protecting data from unauthorized access, modification, or destruction through various measures and practices.

2
New cards

Information System Security

Protecting the systems that hold and process information from threats and vulnerabilities.

3
New cards

Threat

Anything that could cause harm, loss, damage, or compromise to our information technology systems

4
New cards

Vulnerability

Any weakness in the system design or implementation

5
New cards

Risk Management

Finding ways to minimize the likelihood of an outcome and achieve the desired outcome

6
New cards

Confidentiality (Encryption)

Refers to the protection of information from unauthorized access and disclosure

7
New cards

Methods to ensure Confidentiality

■ Encryption
Process of converting data into a code to prevent unauthorized access

■ Access Controls
Strong user permissions can ensure that only authorized personnel can access certain types data

■ Data Masking
Obscuring specific data within a database to make it inaccessible for unauthorized users

■ Physical Security Measures
Locks and keycards

■ Training and Awareness

8
New cards

Integrity (Hashing)

Verifies the accuracy and trustworthiness of data over the entire lifecycle

9
New cards

Methods to maintain Integrity of data

■ Hashing

Process of converting data into a fixed-size value

■ Digital Signatures

Ensure both integrity and authenticity

■ Checksums

Method to verify the integrity of data during transmission

■ Access Controls

Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations

■ Regular Audits

Reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed

10
New cards

Availability (Redundancy)

Ensure that information, systems, and resources are accessible and operational when needed by authorized users

11
New cards

Redundancy

Duplication of critical components or functions of a system to enhance its reliability

12
New cards

Types of Redundancy

■ Server Redundancy

Involves using multiple servers in a load balanced or failover configuration so that if one is overloaded or fails, the other servers can take over

■ Data Redundancy

Involves storing data in multiple places

■ Network Redundancy

Ensures that if one network path fails, the data can travel through another route

■ Power Redundancy

Involves using backup power sources, like generators and UPS systems

13
New cards

Non-repudiation (Digital Signatures)

Providing undeniable proof that an entity is involved in a communication or action.

14
New cards

Authentication

Ensures individuals or entities are who they claim to be during a communication or transaction

15
New cards

Authentication Methods

■ Something you know (Knowledge Factor)

Relies on information that a user can recall

■ Something you have (Possession Factor)

Relies on the user presenting a physical item to authenticate themselves

■ Something you are (Inherence Factor)

Relies on the user providing a unique physical or behavioral characteristic of the person to validate that they are who they claim to be

■ Something you do (Action Factor)

Relies on the user conducting a unique action to prove who they are

■ Somewhere you are (Location Factor)

Relies on the user being in a certain geographic location before access is granted

16
New cards

Authorization

Defines what actions or resources a user can access.

Now that the system knows who you are through authentication, here is what you are allowed to do.

17
New cards

Accounting

Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded. Examples include Syslog servers and Network Analysis Tools.

18
New cards

Security Control Categories

■ Technical Controls

Technologies, hardware, and software mechanisms that are implemented to manage and reduce risk. (example: firewall, antivirus)

■ Managerial Controls

Sometimes also referred to as administrative controls. Involve the strategic planning and governance side of security

■ Operational Controls

Procedures and measures that are designed to protect data on a day-to-day basis. Are mainly governed by internal processes and human actions. (example: Changing password ever 90 days)

■ Physical Controls

Tangible, real-world measures taken to protect assets. (example: Key cards, security guards)

19
New cards

Preventative Controls

Proactive measures implemented to thwart potential security threats or breaches. (example: firewall)

20
New cards

Deterrent Controls

Discourage potential attackers by making the effort seem less appealing or more challenging. (example: warning users they are monitored)

21
New cards

Detective Controls

Monitor and alert organizations to malicious activities as they occur or shortly thereafter. (example: security camera, Intrusion Detection System)

22
New cards

Corrective Controls

Mitigate any potential damage and restore our systems to its normal state. (example: Quarentine and remove malware)

23
New cards

Compensating Controls

Additional measures that are implemented when primary security controls are not feasible or effective.

24
New cards

Directive Controls

Guide, inform, or mandate actions. Often rooted in policy or documentation and set the standards for behavior within an organization. (example: employee guidelines)

25
New cards

Gap Analysis steps

■ Define the scope of the analysis

■ Gather data on the current state of the organization

■ Analyze the data to identify any areas where the organization's current performance falls short of its desired performance

■ Develop a plan to bridge the gap

26
New cards

Technical Gap Analysis

Evaluating an organization's current technical infrastructure. Identifying any areas where it falls short of the technical capabilities required to fully utilize their security solutions.

27
New cards

Business Gap Analysis

Evaluating an organization's current business processes.

28
New cards

Plan of Action and Milestones (POA&M)

● Outlines the specific measures to address each vulnerability

● Allocate resources

● Set up timelines for each remediation task that is needed

29
New cards

Zero Trust

Demands verification for every device, user, and transaction within the network, regardless of its origin.

No user or system is trusted by default and requires continuous verification.

30
New cards

Control Plane

The overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access.

31
New cards

Control Plane key elements

■ Adaptive Identity

Relies on real-time validation that takes into account the user's behavior, device, location, and more,

■ Threat Scope Reduction

Limits the users’ access to only what they need for their work tasks because this reduces the network’s potential attack surface

Focused on minimizing the "blast radius" that could occur in the event of a breach

■ Policy-Driven Access Control

Entails developing, managing, and enforcing user access policies based on their roles and responsibilities

■ Secured Zones

Isolated environments within a network that are designed to house sensitive data

32
New cards

Data Plane

Ensures the policies are properly executed

■ Subject/System

Refers to the individual or entity attempting to gain access

■ Policy Engine

Cross-references the access request with its predefined policies

■ Policy Administrator

Used to establish and manage the access policies

■ Policy Enforcement Point

Where the decision to grant or deny access is actually execute