week-2-security principles

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

CIA Triad

A model of information security that includes three core principles: Confidentiality, Integrity, and Availability.

2
New cards

Confidentiality

The principle that ensures private information is not disclosed to unauthorized individuals.

3
New cards

Integrity

The principle that guarantees information and programs are modified only in a specified and authorized manner.

4
New cards

Availability

The principle that ensures systems are operational and accessible to authorized users when needed.

5
New cards

Authentication

The process of verifying the identity of an individual claiming to be a certain entity.

6
New cards

Nonrepudiation

The assurance that someone cannot deny the validity of their actions, typically in sending or receiving messages.

7
New cards

Threats

Potential dangers that could exploit vulnerabilities in a system.

8
New cards

Vulnerabilities

Weaknesses in a system that allow threats to be realized.

9
New cards

Defense in Depth

A security strategy that employs multiple layers of defense to protect information systems.

10
New cards

Least Privilege

The principle that users and processes should have the minimum levels of access – or permissions – needed to perform their job functions.

11
New cards

Separation of Privilege

A security concept that requires multiple conditions to be met before granting access to sensitive resources.

12
New cards

Separation of Duties

A security practice where no single individual has enough privileges to misuse a system independently.

13
New cards

Fail-safe Defaults

The principle that systems should default to a secure state when failing.

14
New cards

Psychological Acceptability

The idea that security measures should not make systems too difficult or cumbersome for users.

15
New cards

Open Design

The principle that the security of a mechanism should not depend on the secrecy of its design.

16
New cards

Kerckhoff’s Principle

The notion that a cryptographic system should remain secure even if everything about the system, apart from the key, is public knowledge.

17
New cards

Economy of Mechanism

The principle advocating for security designs to be as simple and small as possible for easy verification.

18
New cards

Isolation

A strategy to protect systems from unauthorized use by separating items that may interfere with each other.

19
New cards

Running Untrusted Code

The practice of executing applications from potentially unreliable sources in a controlled manner to prevent damage.

20
New cards

Ethics

A set of moral principles that guide an individual's or group's behavior, especially in the field of information security.

21
New cards

Why are Ethics Important in Security?

They establish trust and responsibility towards protecting confidential data.