Security Concepts and Controls: Module 1 Overview for IT Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/48

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

Confidentiality

Preventing unauthorized access to information. Examples: Encryption, access controls, data masking, steganography.

2
New cards

Integrity

Ensuring information is accurate, complete, and trustworthy, and has not been tampered with. Examples: Hashing, digital signatures, version control, change management, checksums.

3
New cards

Availability

Ensuring authorized users have timely and uninterrupted access to information and resources. Examples: Redundancy (RAID, clustering), backups, fault tolerance, disaster recovery (DR), business continuity (BC), load balancing.

4
New cards

Non-Repudiation

Guarantees that the sender of information cannot later deny having sent it, and the receiver cannot deny having received it. Mechanism: Digital signatures, logging.

5
New cards

Authentication

Verifying the identity of a user, process, or device. Methods: Something you know (password, PIN), something you have (token, smart card), something you are (biometrics), somewhere you are (geolocation), something you do (keystroke dynamics). Protocols: Kerberos, LDAP, RADIUS, TACACS+.

6
New cards

Authorization

Granting or denying access to resources based on authenticated identity and defined permissions. Models: Role-Based Access Control (RBAC), Discretionary Access Control (DAC), Mandatory Access Control (MAC), Attribute-Based Access Control (ABAC).

7
New cards

Accounting (Auditing)

Tracking and logging user activities and resource usage. Purpose: Incident response, forensics, compliance.

8
New cards

Zero Trust

A security model based on the principle of 'never trust, always verify.' All users, devices, and applications, whether inside or outside the network perimeter, must be authenticated and authorized. Key Concepts: Micro-segmentation, least privilege, continuous monitoring.

9
New cards

Honeypots/Honeynets

Decoy systems designed to attract and trap attackers to study their methods.

10
New cards

Honeytokens

Fictitious data designed to lure attackers.

11
New cards

Fake Telemetry

Misleading data to confuse attackers.

12
New cards

Managerial/Administrative Controls

Policies, procedures, guidelines (e.g., security awareness training, incident response plans, risk assessments).

13
New cards

Operational Controls

Controls implemented by people to manage and monitor security (e.g., vulnerability management, penetration testing, log monitoring).

14
New cards

Technical/Logical Controls

Security mechanisms implemented through hardware or software (e.g., firewalls, IDS/IPS, encryption, access control lists).

15
New cards

Preventive Controls

Stop attacks before they happen (e.g., strong passwords, firewalls, encryption).

16
New cards

Detective Controls

Identify attacks that are occurring or have occurred (e.g., IDS/IPS, SIEM, security audits, log analysis).

17
New cards

Corrective Controls

Remediate the effects of an attack (e.g., incident response, patching, data recovery).

18
New cards

Deterrent Controls

Discourage potential attackers (e.g., security cameras, warning signs, strong penalties).

19
New cards

Compensating Controls

Alternative controls used when a primary control is not feasible or effective (e.g., a manual review process if automated scanning is unavailable).

20
New cards

Physical Controls

Controls protecting physical assets (e.g., fences, guards, locks, biometrics, surveillance).

21
New cards

Change Management

To ensure that changes to IT systems and services are implemented in a controlled and coordinated manner, minimizing risks to security and availability.

22
New cards

Request for Change (RFC)

Formal submission of a proposed change.

23
New cards

Impact Assessment

Evaluating potential effects of the change (security, availability, performance).

24
New cards

Approval

Review and authorization by relevant stakeholders (Change Advisory Board - CAB).

25
New cards

Implementation

Executing the change.

26
New cards

Testing

Verifying the change works as expected and hasn't introduced new vulnerabilities.

27
New cards

Documentation

Updating all relevant records (configurations, procedures, baselines).

28
New cards

Rollback Plan

A plan to revert the system to its previous state if the change causes issues.

29
New cards

Security Implications

Improper change management can lead to misconfigurations, open ports, unpatched systems, and security breaches.

30
New cards

Purpose of Cryptography

To protect the CIA triad.

31
New cards

Symmetric Encryption

Uses a single, shared secret key for both encryption and decryption (e.g., AES, DES, 3DES, Blowfish, Twofish).

32
New cards

Pros of Symmetric Encryption

Fast, efficient.

33
New cards

Cons of Symmetric Encryption

Key exchange is a challenge.

34
New cards

Asymmetric Encryption (Public Key Cryptography)

Uses a pair of mathematically linked keys: a public key (shared with anyone) and a private key (kept secret by the owner) (e.g., RSA, ECC, Diffie-Hellman).

35
New cards

Pros of Asymmetric Encryption

Secure key exchange, digital signatures, non-repudiation.

36
New cards

Cons of Asymmetric Encryption

Slower than symmetric encryption.

37
New cards

Hashing

One-way function that takes input data and produces a fixed-size string of characters (hash value or message digest). Used for integrity verification.

38
New cards

Properties of Hashing

Fixed output size, unique output for unique input, computationally infeasible to reverse.

39
New cards

Algorithms for Hashing

MD5, SHA-1, SHA-256, SHA-512.

40
New cards

Salting

A technique used in password storage to prevent common password attacks like rainbow table attacks.

41
New cards

Benefit of Salting

Since each password has a unique salt, two users with the same password will have different hash values, defeating rainbow table attacks and making brute-force attacks significantly more difficult and time-consuming.

42
New cards

Digital Signatures

Uses asymmetric cryptography to verify the authenticity and integrity of a message or document. Provides non-repudiation.

43
New cards

Certificates (X.509)

Digital documents that bind a public key to an identity. Issued by Certificate Authorities (CAs).

44
New cards

Public Key Infrastructure (PKI)

A system for managing digital certificates and public-key encryption. Includes CAs, Registration Authorities (RAs), Certificate Revocation Lists (CRLs), Online Certificate Status Protocol (OCSP).

45
New cards

Key Management

Secure generation, distribution, storage, rotation, and revocation of cryptographic keys.

46
New cards

Hardware Security Module (HSM)

Physical device that safeguards and manages digital keys.

47
New cards

Trusted Platform Module (TPM)

A secure cryptoprocessor on a motherboard that stores cryptographic keys and offers security functions.

48
New cards

Secure Enclave

A dedicated, secure processor or area within a CPU that can protect sensitive data and operations from the main operating system.

49
New cards

Obfuscation

Making something difficult to understand or interpret (e.g., steganography, tokenization, data masking).