FUNDAMENTALS OF SECURITY

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

19 Terms

1
New cards

Information Security

Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction

2
New cards

Information System Security

Act of protecting the systems that hold and process the critical data

3
New cards

Confidentiality, Integrity, and Availability

What does the CIA Triad stand for?

4
New cards

Confidentiality

Ensures that information is only accessible to those with the appropriate authorization

5
New cards

Integrity

Ensures that data remains accurate and unaltered unless modification is required

6
New cards

Availability

Ensures that information and resources are accessible and functional when needed by authorized users

7
New cards

Non-Repudiation

Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved

8
New cards

Confidentiality, Integrity, Availability, Non-Repudiation, & Authentication

What does CIANA Pentagon stand for?

9
New cards

Authentication, Authorization, & Accounting

What are the triple A’s of Security?

10
New cards

Authentication

Process of verifying the identity of a user or system

11
New cards

Authorization

Defines what actions or resources a user can access

12
New cards

Accounting

Act of tracking user activities and resource usage, typically for audit or billing purposes

13
New cards

Security Controls

Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity, and availability of information systems and data

14
New cards

Technical, Managerial, Operational, & Physical

What are the Security Control categories?

15
New cards

Preventative, Deterrent, Detective, Corrective, Compensating, & Directive

What are the Security Controls types?

16
New cards

Zero Trust

Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default

17
New cards

A Control Place & A Data Plane

In order to achieve Zero Trust, we have to use a __________ __________ and a __________ ___________

18
New cards

Control Plane

Consists of the adaptive identity, threat scope, reduction, policy-driven access control, and secured zones

19
New cards

Data Plane

Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points