IT security Fundamentals

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

flashcard set

Earn XP

Description and Tags

Sec Plus+

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Zero trust

centers belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify anything and everything trying to connect to their systems before granting access.

2
New cards

CIA Triad

The CIA Triad is a foundational model in IT security that emphasizes three core principles: Confidentiality, Integrity, and Availability. These principles guide organizations in protecting their information and systems.

3
New cards

Confidentiality

Keeping information private and secure from unauthorized access.

4
New cards

Integrity

Ensuring that information is accurate and hasn't been tampered with.

5
New cards

Availability

Making sure information is accessible when needed.

6
New cards

DAD Triad

The DAD Triad for bad guys refers to the malicious actions they aim to carry out. the opposite of the CIA Triad

7
New cards

Disclosure

Exposing sensitive data to unauthorized parties.

8
New cards

Denial

Denying access to data or services

9
New cards

Alteration

Modifying data to corrupt or manipulate it.

10
New cards

Non repudiation

Ensures that actions or transactions can't be denied by the person who performed them. (Digital signatures, Audit logs)

11
New cards

AAA (Triple A)

  • Authentication: this is the process of verifying the identity of a user device or other entity in a computer system.


  • Authorization: once a user is authenticated the authorization process determines what that user is permitted to do by matching user or system credentials against an access control list.


  • Accounting: (sometimes referred to as auditing) accounting is insured by a track of activities. It involves the logging and monitoring of user actions.

12
New cards

Gap analysis

A process to compare current performance with desired goals to identify areas for improvement. and figure out where the gap between the two are.