CIA Triad: Confidentiality, Integrity, Availability

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

______ is something in need of protection.

Asset

______ is a gap or weakness in protection efforts.

Vulnerability

______ aims to exploit a vulnerability to thwart protection efforts.

Threat

The process of identifying, estimating and prioritizing risks is known as ______.

<p>Risk Assessment</p> Signup and view all the answers

______ relates to making decisions about the best actions to take regarding the identified and prioritized risk.

<p>Risk Treatment</p> Signup and view all the answers

______ are put in place by organizational governance, such as executive management, to provide guidance in all activities.

<p>Policies</p> Signup and view all the answers

______ are the detailed steps to complete a task that support departmental or organizational policies.

<p>Procedures</p> Signup and view all the answers

The ______ is a framework that helps to establish trust in the use of public key cryptography to sign and encrypt messages via digital certificates.

<p>Public Key Infrastructure</p> Signup and view all the answers

______ can authenticate a sender, because they control a private key that produces messages in a way that no one else can.

<p>Public key cryptography</p> Signup and view all the answers

______ proves integrity by computing a unique fixed-size message digest from any variable length input.

<p>Hashing</p> Signup and view all the answers

Signup and view all the answers

Flashcards

Confidentiality

Security professional's obligation to regulate access—protecting data while allowing authorized access.

Integrity

Measures the degree to which something is whole, complete, internally consistent, and correct.

Availability

Timely and reliable access to information and services for authorized users.

Authentication

Process of verifying or proving a user's identification.

Signup and view all the flashcards

Non-Repudiation

Protection against an individual falsely denying having performed a particular action.

Signup and view all the flashcards

Information Security Risk

Potential adverse impacts from unauthorized access, use, disclosure, disruption, modification, or destruction of information systems.

Signup and view all the flashcards

Asset

Something in need of protection; anything of value, tangible or intangible.

Signup and view all the flashcards

Vulnerability

Gap or weakness in protection efforts.

Signup and view all the flashcards

Threat

Something or someone aims to exploit a vulnerability to thwart protection efforts.

Signup and view all the flashcards

Risk Assessment

Process of identifying, estimating, and prioritizing risks to an organization's operations, assets, and individuals.

Signup and view all the flashcards

Study Notes

  • Cybersecurity focuses on protecting digital information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction
  • A CIA Triad is a model designed to guide security policies

CIA Triad

  • Confidentiality: Protecting sensitive information from unauthorized access
  • Regulates access to protect data while allowing authorized access
  • Uses Personally Identifiable Information (PII), which is any data that can identify an individual
  • Uses Protected Health Information (PHI), which is information regarding one's health status
  • Integrity: Ensuring data is whole, complete, consistent, and correct
  • Important when regarding Data integrity, the property that data has not been altered without authorization
  • System Integrity is when the system performs its intended function
  • Availability is the timely and reliable access to information for authorized users
  • Authentication verifies a user's identification through passwords, tokens, or biometrics
  • Single-Factor Authentication (SFA) uses one method of authentication
  • Multi-Factor Authentication (MFA) uses multiple authentication methods
  • Non-Repudiation is a legal protection against falsely denying actions
  • Privacy is an individual's right to control their information distribution
  • General Data Protection Regulation (GDPR) applies to organizations doing business in the EU or with EU citizens
  • Information Security Risk includes potential adverse impacts from unauthorized actions
  • Asset: Something needing protection, tangible or intangible
  • Vulnerability: A gap or weakness in those protection efforts
  • Threat: Something or someone that aims to exploit a vulnerability

Threat Actors

  • Insiders act deliberately, by simple human error, or by gross incompetence
  • Outside individuals or informal groups act either planned or opportunistic
  • Formal nonpolitical entities include business competitors and cybercriminals
  • Formal political entities include terrorists, nation-states, and hacktivists
  • Intelligence or information gatherers can be any of the above
  • Technology includes free-running bots and AI
  • Risk Assessment identifies, estimates, and prioritizes risks to an organization
  • Risk Treatment involves deciding on the best actions for prioritized risks
  • Avoidance eliminates the risk entirely
  • Acceptance takes no action to reduce the risk
  • Mitigation prevents or reduces the possibility of a risk event
  • Risk Transference passes the risk to another party in exchange for payment

Cybersecurity Frameworks

  • Identify develops security policies and evaluates risks
  • Protect involves procuring, developing, installing, and operating IT assets with embedded security
  • Detect performs ongoing monitoring
  • Respond identifies, analyzes, contains, and eradicates threats
  • Recover implements resilience to restore systems and data
  • Security Controls include safeguards or countermeasures for information systems

Types of security controls

  • Physical Controls use hardware devices and architectural features to control movement
  • Technical Controls (logical controls) provide automated protection and facilitate detection
  • Administrative Controls (managerial controls) are directives and guidelines for human behavior
  • RBAC (Role-Based Access Control) grants access based on user roles
  • granular access using access control entries at the individual user levels
  • Governance Elements ensure organizational activities support standards and regulations

Examples of governance elements

  • Procedures are detailed steps for completing tasks
  • Policies are guidance provided by organizational governance
  • Standards provide a framework to introduce policies and procedures
  • Regulations are laws that carry financial penalties for noncompliance
  • The Health Insurance Portability and Accountability Act (HIPAA) OF 1996 governs the use of protected health information (PHI) and can result in fines and imprisonment
  • The International Organization for Standardization (ISO) develops international standards
  • The National Institute of Standards and Technology (NIST) publishes technical standards
  • The Internet Engineering Task Force (IETF) creates standards for communication protocols
  • The Institute of Electrical and Electronics Engineers (IEEE) sets standards for telecommunications
  • Policies are broad, but not detailed
  • Governance Policies are used to moderate and control decision-making
  • Procedures are explicit, repeatable activities
  • Cryptographic Algorithms encode or decode data
  • Modern Cryptographic Systems includes symmetric and asymmetric algorithm
  • Cryptography encodes information to make it secure
  • Plaintext (or cleartext) is an unencrypted message
  • Ciphertext is an encrypted message
  • Algorithms encrypt and decrypt messages
  • Cryptanalysis cracks cryptographic systems
  • Encryption Algorithm or Cipher encodes data for secure storage and transmission
  • A KEY is used with the encryption cipher to ensure only authorized users can decrypt
  • Symmetric Encryption uses the same secret key for encryption and decryption

Encryption

  • Encryption Algorithms use a key to increase security
  • A Keyspace is the range of values for keys
  • Modern Ciphers use large key spaces
  • Modern Symmetric Ciphers use bits and the number of bits is the key length
  • Asymmetric Encryption uses two different keys (public and private)
  • A public key encrypts and only its paired private key decrypts

Encryption functions

  • Hashing produces a fixed-length bit string (hash or message digest)
  • Secure Hash Algorithm (SHA) is considered the strongest, with SHA256 (256-bit digest) being the most popular
  • Message Digest Algorithm #5 (MD5) produces a 128-bit digest but may be needed for compatibility
  • Public Key Cryptography authenticates a sender via a private key
  • Hashing proves integrity by computing fixed-size message digests
  • Digital Signatures combine cryptography and hashing
  • Public Key Infrastructure (PKI) establishes trust
  • Private CAs operate within an organization
  • Third-Party CAs can be used to establish trust between servers and clients
  • Digital Certificates wrap a subscriber's public key and information

Data security

  • Encryption keeps data safe, even if stolen during storage and or intercepts in transit
  • Data at Rest: Data in persistent storage
  • Data in Transit (or data in motion): Data being transmitted over a network
  • Data in Use (or data in processing): Data in volatile memory
  • Encrypting megabytes or gigabytes of data is referred to "bulk"
  • Data Encryption in Bulk uses a symmetric cipher, such as AES
  • Full-disk encryption (FDE) encrypts the entire disk
  • Volume Encryption encrypts an entire section like (disk, partition or drive).
  • File Encryption encrypts individual files or folders
  • Transport/Communication Encryption secures data-in-motion
  • Wi-Fi Protected Access (WPA) secures traffic over wireless networks
  • Internet Protocol Security (IPSec) secures traffic between two endpoints
  • Transport Layer Security (TLS) secures application data

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser