CompTIA Security + Chapter 1
CompTIA Security + Chapter 1
24%
3.0 Implementation
25%
Confidentiality Integrity
o Ensuring data security and protected
o Security of personal and
from any unauthorized threats or
confidential information from
harm
unauthorized individual or o Ensure if data is access by user, the
organization
o Includes data segregation according data remains undamaged and
Security unchanged
to data sensitivity for user access
CIA-
Availability
Confidentiality,
Integrity and o Monitoring system working and
Availability ensuring service is not died for any
authorized user due to system failure
Data Breach Risks
Security incidents compromise
confidentiality, integrity, and/or
availability of information.
Incidents may result from
malicious, accidental, or
natural causes. 01
02
03
Denial: Unintended disruption of legitimate access.
What is Cybersecurity?
The application of technology, techniques, and
controls to defend systems, networks, programs,
devices, and data against cyberattacks is known
as cybersecurity
Its objectives are to lower the number of incidents of cyberattacks and safeguard
against the unauthorized exploitation of technology, networks, and systems,
meant to create chaos and panic.
10
Implementing
Security Controls
Managerial Controls:
Technical Controls: Enforce
Procedural mechanisms for
security in digital space (e.g.,
risk management (e.g., risk
firewalls, encryption).
assessments, security
planning).
Data Minimization:
Data Loss Prevention
Data Encryption: Reduces risk by
(DLP): Enforces
Protects data in minimizing stored sensitive
information handling
transit and at rest. information.
policies.
Summary and Exam Essentials