ITEC85 - Introduction to Information Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:36 AM on 4/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

48 Terms

1
New cards

Pre-Computer

Security meant physical safes, guards, and codebooks (Enigma machine).

2
New cards

1960s (ARPANET)

Early internet. Security was not a priority; connectivity was. This legacy of "openness" creates many vulnerabilities today.

3
New cards

1990s (The Morris Worm)

The first major internet worm showed us the need for network security.

4
New cards

Today

Interconnected IoT, Cloud, and AI mean the attack surface is everywhere.

5
New cards

Information Security (InfoSec)

The protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information.

6
New cards

Information Assurance (IA)

A broader term that includes reliability and strategic risk management. It means ensuring the data is not only safe but usable for the business.

7
New cards

The CIA Triad

The industry standard model for security.

Confidentiality

Integrity

Availability

8
New cards

The Core Principle: Confidentiality

Ensuring that information is accessible only to those authorized to have access.

9
New cards

The Core Principle: Confidentiality

Breach Example: A hacker stealing credit card numbers (Data Leak).

10
New cards

The Core Principle: Confidentiality

Controls: Encryption, Passwords, Multi-Factor

Authentication (MFA), File Permissions.

11
New cards

The Core Principle: Integrity

Ensuring that information remains accurate, complete, and is not modified by unauthorized actions (whether malicious or accidental).

12
New cards

The Core Principle: Integrity

Breach Example: A student changing their grade in the database from F to A.

13
New cards

The Core Principle: Integrity

Controls: Hashing (checksums), Digital Signatures, Version Control, Backups.

14
New cards

The Core Principle: Availability

Ensuring that authorized users have access to information and assets when required.

15
New cards

The Core Principle: Availability

Breach Example: A Denial of Service (DoS) attack crashing a website, or a power outage shutting down a server.

16
New cards

The Core Principle: Availability

Controls: Redundant power (UPS), RAID (disk redundancy), Cloud Backups, Disaster Recovery Plans.

17
New cards

Balancing the Triad

- You cannot have 100% of all three.

- Business Alignment

18
New cards

You cannot have 100% of all three.

Example: To make a system perfectly Confidential (unplug it from the internet), you hurt Availability (remote users can't access it).

19
New cards

Business Alignment

The balance depends on the business goal. A bank prioritizes Integrity. A news site prioritizes Availability.

20
New cards

The McCumber Cube

Created by John McCumber. It creates a grid to ensure no security gap is missed.

21
New cards

X-Axis

Security Principles (CIA Triad).

22
New cards

Y-Axis

Information States (Transmission, Storage, Processing).

23
New cards

Z-Axis

Countermeasures (Technology, Policies, People)

24
New cards

States of Data

Data at Rest (Storage)

Data in transit (Transmission)

Data in Process

25
New cards

States of Data - Data at Rest (Storage)

Data stored on a physical or

digital medium (Hard drives, USBs, Cloud servers, Filing cabinets).

26
New cards

States of Data - Data at Rest (Storage)

Risk: Physical theft, hacking the server.

27
New cards

States of Data - Data at Rest (Storage)

Control: Disk Encryption (BitLocker), Physical locks.

28
New cards

States of Data - Data in Transit (Transmission)

Data currently moving across a network (Cable, Wi-Fi, Cellular).

29
New cards

States of Data - Data in Transit (Transmission)

Risk: Interception (Man-in-the-Middle attacks), Eavesdropping.

30
New cards

States of Data - Data in Transit (Transmission)

Control: VPN (Virtual Private Network), SSL/TLS (HTTPS websites).

31
New cards

States of Data - Data in Process

Data currently being used by

the computer's CPU or RAM. It is unencrypted during this brief moment to be readable by the computer.

32
New cards

States of Data - Data in Process

Risk: Malware reading memory, Power loss causing corruption.

33
New cards

States of Data - Data in Process

Control: Antivirus, Error-checking memory.

34
New cards

Countermeasures

- Technology

- Policies and Practices

- People

35
New cards

Countermeasures - Technology

- The hardware and software tools.

36
New cards

Countermeasures - Technology

Firewalls, IDS/IPS, Biometrics, Smart Cards.

37
New cards

Countermeasures - Technology

Note: _____ is often the first line of defense, but not the only one.

38
New cards

Countermeasures - Policies and Practices

The administrative rules.

39
New cards

Countermeasures - Policies and Practices

"Users must change passwords every 90 days."

"No USB drives allowed."

Policies enforce the use of technology.

40
New cards

Countermeasures - People

The human factor. Often called the "weakest link" but can be the "strongest asset."

41
New cards

Countermeasures - People

Training, Awareness programs,

Background checks.

42
New cards

Countermeasures - People

Example: You can have the best firewall, but if a user gives their password to a

stranger (Phishing), the firewall is useless.

43
New cards

Critical Characteristics of Information

- Accuracy

- Authenticity

- Utility

- Possession

44
New cards

Accuracy

Data is free from errors

(Integrity).

45
New cards

Authenticity

Data is genuine and came

from the stated source.

46
New cards

Utility

The data has value to the

organization.

47
New cards

Possession

The organization actually

owns/controls the data.

48
New cards

Summary & Key Takeaways

Effective security requires addressing every intersection of the Cube. But, we cannot achieve 100% of it as it may hurt the other aspects within

the Cube.

(e.g., Protecting Confidentiality of Data in Transit using Technology).