What are the three pillars of the CIA Triad?
Confidentiality, Integrity, and Availability.
What does Confidentiality protect?
Ensures data is seen only by authorized parties. Controls: encryption, access controls, MFA, data classification.
What does Integrity protect?
Ensures data has not been tampered with or altered. Controls: hashing, digital signatures, checksums, write-once logs.
What does Availability protect?
Ensures systems and data are accessible when needed. Controls: redundancy, backups, load balancers, failover.
Ransomware primarily threatens which CIA pillar?
Availability — it encrypts data and systems, making them inaccessible.
A data breach primarily threatens which CIA pillar?
Confidentiality — unauthorized parties gain access to sensitive data.
Tampered audit logs threaten which CIA pillar?
Integrity — the logs have been altered and can no longer be trusted.
What does AAA stand for in security?
Authentication, Authorization, and Accounting.
What is Authentication?
Verifying identity — answering ‘Who are you?’ Examples: passwords, fingerprints, smart cards, MFA.
What is Authorization?
Granting or denying access — answering ‘What can you do?’ Examples: file permissions, RBAC policies, firewall rules.
What is Accounting?
Logging and tracking activity — answering ‘What did you do?’ Examples: SIEM logs, audit trails, session recording.
Which always comes first: authentication or authorization?
Authentication. You must verify WHO someone is before deciding WHAT they can access.
What is IAM?
Identity and Access Management (eye-ay-em) — the umbrella discipline for managing identities, credentials, and permissions.
What is RBAC?
Role-Based Access Control (ar-back) — permissions assigned based on job role within the organization.
What is ABAC?
Attribute-Based Access Control (ay-back) — access decisions based on attributes like time, location, device, and user properties.
How does RBAC differ from ABAC?
RBAC assigns permissions by job role (simple). ABAC uses multiple attributes for granular, context-aware decisions.
What is the principle of least privilege?
Users get only the minimum permissions needed to perform their job — nothing more.
What is separation of duties?
No single person should control an entire critical process. Requires multiple people to complete sensitive tasks.
What is MFA?
Multi-Factor Authentication (em-eff-ay) — requiring two or more different authentication factors to verify identity.
What are the three MFA factor categories?
Something you know (password/PIN), something you have (smart card/phone), something you are (fingerprint/face).
What is TOTP?
Time-Based One-Time Password (tee-oh-tee-pee) — authentication code that changes every 30 seconds, synced to time.
What is HOTP?
HMAC-Based One-Time Password (aitch-oh-tee-pee) — authentication code that changes with each use, based on a counter.
How does TOTP differ from HOTP?
TOTP is time-based (code expires every 30 seconds). HOTP is counter-based (code changes on each use).
A password + fingerprint = how many factors?
Two factors: something you know + something you are. This is valid MFA.