sussy.win

1.1 Security Controls

Categories

Control types

1.2 Fundamental Security Concepts

CIA (Confidentiality Integrity Availability)

Non-repudiation

Ensures if action taken, it can be proved through digital evidence. Makes sure you can't deny it

AAA (Authentication, Authorization, Accounting)

Framework for managing access to systems/networks
First a user must be Authenticated (user/pass). Then the user gets Authorized (assigns permissions). Lastly the accounting process starts, which logs user behavior and actions

Gap Analysis

evaluation of security objectives, sort of like internal audit on security practices

Zero Trust

states no entity within network is assumed safe. all traffic within/outside the network is potential threat and must be evaluated prior to transmission

Physical security

2.1 Threat actors & motivations

Threat actors

Motivations

2.2 Threat vectors & surfaces

Threat Vectors - method used
Attack Surface - vulnerability within system/network

Vulnerabilities

Application