CIA Triad
Integrity
Safeguarding against improper modification or destruction of information
Quality of IT that reflects, logical correctness and reliability of the OS, and logical completeness of hardware and software that implements the protection mechanisms
Consistency of data structures and occurrence of stored data.
Examples:
OS performs checksum, when file is moved or copied from one volume to another.
Frame check sequence conducted on an Ethernet frame when sent from one MAC address to another.
A hashed message authentication code applied to advertisements sent between neighbor systems such as a routers or gateways.
Implementing a mandatory access model technique such as Biba or Clark-Wilson.
AAA
Authorization Models:
DAC - Discretionary access control
RBAC - Role-based access control
MAC - Mandatory Access Control
ABAC - Attribute-based access control
ABDAC - Attribute-based dynamic access control
RBAC - Rule based access control
Quiz:
1 Question: Which of these are common ways to authenticate people?
2 Question: Which type of security control is made up of mandatory policies and regulations that are in place to maintain consistency and compliance?
3 Question: Which security control enforces the inability of a subject to deny that they participated in a digital transaction, agreement, contract, or communication such as an email?
4 Question: Which category of controls supports ongoing maintenance, due care, and continual improvement such as conducting tested patch management?
5 Question: Which security goal controls an attacker's ability to get unauthorized access to data or information from an application or system?
6 Question: What is a strict mathematical model where access to resources is determined by the system based on predefined security labels and rules?
7 Question: What is one way to enable authentication of non-traditional network endpoints such as smart card readers, HVAC systems, medical equipment, and IP-enabled door locks?
8 Question: What is the process of granting an authenticated entity permission to access a resource or perform a specific function?