quick reference sheet
Table of Contents
..............................................................................
Fundamentals.............................................................................Page 1
Threats and Vulnerabilities.....................................................Page 1
Network Security.......................................................................Page 3
Application, Data, and Host Security...................................Page 4
Access Control and Authentication Services.....................Page 5
Cryptography Basics................................................................Page 5
Compliance and Operational Security.................................Page 6
Risk Management.....................................................................Page 7
Managing Security Incidents..................................................Page 8
Business Continuity and Disaster Recovery Planning......Page 8
Fundamentals
Information Security
Information security refers to the protection of available information or information resources from unauthorized access, attacks, thefts, or data damage. The three primary goals of information security are prevention, detection, and recovery.
Confidentiality
The CIA Triad
Integrity
Availability
Principle
Description
Confidentiality
The fundamental principle of keeping information and communications private and protecting them from unauthorized access.
Integrity
The property of keeping information accurate, free of errors, and without unauthorized modifications.
Availability
The fundamental principle of ensuring that systems operate continuously and that authorized persons can access the data that they need.
Vulnerabilities, Threats and Attacks
A vulnerability is any condition that leaves a system open to attack, and a threat is any event or action that could potentially result in a
violation of a