domain 1: introduction to security fundamentals

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Confidentiality

ensures data is not accessed by unauthorized individuals

2
New cards

Integrity

ensures data is not tampered with

3
New cards

Availability

ensures data is accessible to authorized users when needed

4
New cards

Threats to confidentiality

  • Intentional attacks

  • Accidental triggers

  • Authentication and authorization failures

  • Hardware or software failures

  • Improper media sanitization: remove data

5
New cards

Countermeasures To confidentiality

  • Encryption

  • Access control

  • Administrative policies

6
New cards

Threats to integrity

  • Intentional alteration

  • Accidental modifications

  • System malfunction

  • Environmental factors

7
New cards

Countermeasures to integrity

  • Cryptographic hash: figures out if file has been modified

  • Checksum: detects basic error

  • Database integrity: enforce integrity constraints

8
New cards

Threats to availability

  • Malicious attacks

  • Supply system failures

  • Device or system failures

  • Environmental issues

9
New cards

Countermeasures To availability

  • Clusters

  • Backup procedures

  • Security devices

10
New cards

Non-repudiation

it is a service that provides proof that a particular action or event has occurred, ensuring that it cannot be denied by any party involved.

11
New cards

Tools for Non-repudiation

  • Audit trails

  • Digital signatures

  • Secure time-stamping

12
New cards

Access to your private key can allow hackers to create digital signatures in your name.

If private key is compromised

  1. Revoke the private key

  2. Notify the contacts

  3. Generate new key pair

  4. Distribute the public key

13
New cards

AAA

Identification: provides identity

Authentication: verified identity

Authorization: grants access to

Accounting: tracks activity

14
New cards

Multi factor authentication

  • Something you know: him, password, security question. Least pensive to implement.

  • Something you have: RSA, tokens, activity, identity, cards, smartphones.

  • Something you are: biometrics, fingerprint, retina scans, speech recognition. Most expensive to implement but most secure.

15
New cards

Remote Authentication Dial-in User Service:

it offered centralized authentication, authorization, and accounting for users accessing network service.

16
New cards

Remote Authentication Dial-in User Service Example

remote user attempts to access switch, using username and password in which the switch sends credential username and password to radius server. The credentials are managed centrally on the radius server using radius protocol In which it verifies the credentials. If credentials are valid or not, it sends an access accept or reject message back to the network switch. Just switch, then grant access to a user to use network.

17
New cards

Characteristics of radius

  • Operate as a client server protocol running at the application layer

  • Encrypts only the password during transmissions

  • Uses UDP traditionally (does not guarantee the data packet will reach it destination, best effort delivery)

  • Used as the back and protocol for 802.1X authentication

  • Uses TCP with newer implementation

18
New cards

Terminal access controller access control system plus (TACACS+)

It is similar to radius, but it is a Cisco propriety networking pro protocol .

  • Clients initiate the connection and send request

  • Server response to these request

  • Server cannot initiate communication with the client

19
New cards

Characteristics

  • It is incompatible with the older versions

  • It uses TCP to provide reliable connection

  • It encrypts both  username and password

  • It separates the task of authentication authorization and accounting offering flexibility

20
New cards

DIAMETER

It is derived from radius, but is not back where compatible

  • It supports all forms of network connectivity

  • It allows server to initiate communication (peer-to-peer)

  • It uses TCP (transmission control protocol) or SCTP(stream control transmission protocol)

  • Highly scalable

  • It is more robust intecting and correcting errors compared to radius

21
New cards

Decentralized access control (DAC):

it is a cyber security approach where decision-making authority over access permissions is dedicated to individuals or managers closer to the resources.

22
New cards

Decentralized access control (DAC) pros and cons

Pro:

  • Managers or resource owners at individual sites or department assign access permissions directly to employees

Con

  • Variation in enforcement

Pro:

  • Decisions are taken faster

Con:

  • Conflict of interest

Pro:

  • it improves efficiency for large scale operations

Com:

  • security gaps

23
New cards

Gap analysis

it is a systematic process to assess the difference between an organizations, current security posture and its desired state.

24
New cards

Gap analysis steps

Gap analysis:

  1. Define the desired state; determined security objectives and goals. Select framework, standards or compliance requirements.

  2. Evaluate the current security controls.

       Key areas to assess

  • network security

  • Endpoint protection

  • Access management

  • Data security

  • Incident response

  • Remote access capabilities

  • Training and awareness

  1. Identifying gaps and vulnerabilities: these are weaknesses in your system, processes, or policies that could be exploited by attackers or result in operational inefficiencies.

  2. Assess risk: this involves understanding the impact of a potential issue and the likelihood of it occurring.

  3. Develop and action plan

25
New cards

Benefits of security gap analysis

  • improved security posture

  • Enhanced risk management

  • Compliance readiness

  • Informed decision making

  • Strengthens organizational resilience

26
New cards

Tools and  techniques for security gap analysis

  • security questionnaires and checklist: used to systematically, assess an organization, security posture against predefined standards, and best practices.

  • Vulnerability scanning tools: identify, vulnerabilities and systems, networks, or applications.

  • Security rating platforms: evaluate the security posture of organizations or Internet connected devices and provide a security score that reflects an organization cybersecurity hygiene.

  • Penetration testing tools: used to simulate, real-world attacks, identify exploitable vulnerabilities, in systems or applications.

27
New cards

Defense in depth:

multiple defensive mechanisms are implemented at different layers to protect critical data and systems.

28
New cards

Network security architecture sequence

Traffic —> perimeter security —> internal routing layer —> firewall —>intrusion prevention system —> endpoint security —> filtered traffic

29
New cards

Zero trust network

never trust always verify

  • treats, external and internal users with the same level of scrutiny and applies consistent security measures

30
New cards

Zero trust network core principles

  • least privilege: only the minimum permissions required to complete their task.

  • continuous verification:

  • Contextual authentication: evaluate beyond username and password including the device environment, IP address etc.

  • Multi factor authentication

  • Identity, authentication, and authorization management

  • Micro-segmentation

  • Encryption

31
New cards

Zero trust network core features

  • equal security for everyone

  • Identify verification

  • Device not trusted by default

  • Access on a need to know basis

32
New cards

Zero trust control planes

  • adaptive identity: it is a dynamic and context aware approach to authentication and authorization that ensures that trust is continuously validated throughout session.

  • Beyond validation of usernames and passwords

      -user location, time of access, device, behavior patterns

33
New cards