Concerned with keeping data safe and private
Confidentiality
Both the sender and receiver use the exact same key encrypt/decrypt the message
Symmetric Encryption
Symmetric encryption faces a key distribution challenge, requiring secure sharing of the key among users that need it
Key Management
Two different keys are used to give confidentiality, one for the sender, and one for the receiver
Asymmetric Encryption
Encrypts information and facilitates key exchange using asymmetric encryption like RSA
Public Key Infrastructure (PKI)
Symmetric - Used for faster data transfer
Asymmetric - Used for handshake and key exchange
Ensures that the data was not modified in storage or in transit, verifying the original source
Integrity
Running a string of data through an algorithm to create a hash or a hash digest that servers as a unique individual fingerprint for the data
Hashing
Matching of the has sent and the hash received means there was integrity in the transmission
Measures data accessibility
Availability
Person or event that has the potential for impacting a valuable resource in a negative manner
Threat
Quality or characteristic within a given resource or environment that might allow the threat to be realized
Vulnerability
Any threat that originates within the organization itself
Internal Threat
Any threat that could be people, like a hacker, it can be an event or environmental ocndition
External Threat
Undesirable conditions or weaknesses that are in the general area surrounding the building where a network is run
Environmental Vulnerabilities
Undesirable conditions or weaknesses in the buildings where a network is run
Physical Vulnerabilities
Focuses on how the network and its systems are run from the perspective of an organization’s policies and procedures
Operational Vulnerabilities
System-specific conditions that create security weaknesses | CVE or Zero-day
Technical Vulnerabilities
List of publicly disclosed computer security weaknesses
Common Vulnerabilities and Exposures (CVE)
Any weakness in the system design, implementation, software code, or a lack of preventive mechanisms within a network that is unknown at the time of publication
Zero-Day Vulnerability
CVE - Knwon vulnerabilities
Zero-Day - Brand new vulnerability
Piece of software code that takes advantage of a security flaw or vulnerability within a system or network
Exploit
Identification, evaluation, and prioritization of risks to minimize, monitor, and control the vulnerability exploited by a threat
Risk Management
Process that identifies potential hazards and analyzes what could happen if a hazard occurs
Risk Assessment