Chapter 01 - Security Principals
Chapter 01 - Security Principals
1. Security Concepts
2. Security Controls
CIA Triad
CIA is basically a model (more like the standard model) or a framework
• Availability - You are able to access the data when you need it without any delays
Confidentiality
Confidentiality is the process of keeping safe while preventing disclosure to
unauthorized parties. This does not mean you should keep everything a secret.
This simply means that even if people are aware that such data/information
exists, only the relevant parties can have access to it.
Related Terms:
1. Personally Identifiable Information (PII)
Eg: Full name, Mailing address, Credit card info, passport info, telephone numbers
Integrity
The integrity of the information means the information is and stays the
original, accurate, unchanged accidentally or improperly by any authorized or
unauthorized party.
Solution – Hashing
Hash functions are one-way mathematical functions that produce a result commonly
known as a message digest, a hash value, or more simply, a hash
Availability
You are able to access the data or information you need when you need it
without any delays or long wait times. There are lots of threats to the
availability of data.
Eg :
• Natural disasters - Major loss of data.
• Human-initiated threats –
Distributed Denial Of Service attacks (DDoS)
Configuration faults
• Internet failures
• Bandwidth limitations
Nonrepudiation
You are able to access the data or information you need when you need it
without any delays or long wait times. There are lots of threats to the
availability of data.
Privacy
Privacy is the protection of the confidentiality of personal information
Eg:
General Data Protection Regulation (GDPR)
The General Data Protection Regulation (GDPR) is a legal framework that sets
guidelines for the collection and processing of personal information from
individuals who live and outside of the European Union (EU)
AAA
AAA Stands for;
A – Authentication (Identity of the user, who are you?)
A – Authorization (What is the user allowed to do?)
A – Accounting (For billing and auditing)
Authentication
Authentication is the first level of access control. Before you access a system,
the system challenges you so that you have to provide a user id and a
password.
Types of Authentications
• Single-factor authentication (SFA) - Using only one of the methods of
authentication
• Multi-factor authentication (MFA) - Granting users access only after
successfully demonstrating or displaying two or more of these methods.
Physical Control
Physical (environmental) security protects the Confidentiality, Integrity, and
Availability of physical assets: people, buildings, systems, and data.
Eg:
• Fences
• Gates
• Bollards
• Locks
• Guards
• Tailgating
• Smart cards
Administrative Control
Security mechanisms that are management’s responsibility and referred to as
“soft” controls. These controls include the development and publication
awareness training; the monitoring of system activity; and change control
procedures.
Eg:
• Access Control Lists (ACL) – Network traffic filters that can control incoming
or outgoing traffic.
• Configuration Rules – Instructional codes that guide the execution of the
system when information is passing through it.
Try this
1. A big organization's chief information security officer (CISO) drafted a policy governing
the acceptable usage of cloud environments by all employees. This is an instance of?
A. Technical Control
B. Administrative Control
C. Physical Control
D. Cloud Control
2. A user receives an email that they believe to have been sent by a colleague. In actuality,
the email was spoofed by an attacker. What security services would have indicated that the
message was spoofed?
a. Privacy
b. Authorization
c. Integrity
d. Non-repudiation
4. Ranil is a security professional entrusted with preventing laptop theft from the
organization's offices. Which type of security control is most likely appropriate for this
purpose?
A. Obverse
B. Technical
C. Administrative
D. Physical
5. Linkedin - https://www.linkedin.com/in/wenuragayan/