What is Risk Management in Cyber Security?
Describe Confidentiality.
Protection of information from unauthorized access and disclosure.
ex. Encryption
Why is Confidentiality important?
Name 5 methods to ensure Confidentiality.
Encryption
Process of converting data into code to prevent unauthorized access.
Access Controls
User permissions that ensure only authorized personnel can access certain data.
Data Masking
Obscuring data for unauthorized users while maintaining authenticity and use for authorized users.
Physical Security Measures
Physical measures used to protect both physical and digital data.
Ex. Cameras, Biometric scanners, keycards, door locks, cabinet locks etc.
Training & Awareness
Training personnel on security awareness & best practices to mitigate human error and protect sensitive data.
Describe Integrity
Verifies the Accuracy and Authenticity of Data over the entire lifecycle.
Why is Integrity important?
Name 5 Methods to ensure Integrity
Hashing
Converting data into a fixed-size value.
Hash Digest
Digital fingerprint
Digital Signatures
Uses encryption to ensure integrity and authenticity
Checksums
Method to verify the integrity of data during transmission.
Regular Audits
Reviewing logs and operations to address discrepancies and ensure authorized changes.
Describe Availability
Ensuring that data, systems and services are accessible and operational to authorized end users.
How is the quality Availability status determined?
By the number of “nines”
ex. 99.9%, 99.999%
What is the Gold Standard for Availability status?
Five “nines” (99.999%)
Why is Availability important?
What is Redundancy?
Duplicating Critical system components and functions to ensure reliability.
What are 4 types of Redundancy ?
Server Redundancy
Using a Load balancer configuration to ensure server uptime should one fail.