Security Plus Chapter 1 - Introduction
Posted on: at

1. Intro To Security
Information Security:
- Act of protecting data and information from unauthorized access, unlawful modification, disruption, disclosure, corruption and destruction.
Information System Security:
- Act of protecting system that holds and process our crucial data.
Comments:
-
Unlawful Modification means Modification or editing of data by some unauthorized 3rd Person.
-
Unlawful Disruption means Creating problems while using or accessing the data.
-
Unlawful Disclosure means Preventing Leakage of sensitive or private data.
-
Unlawful Corruption or corruption means preventing data from self corruption by taking regular backups or by some unauthorized 3rd party.
-
Unlawful Destruction means preventing corruption or deletion of data by 3rd party.
2. CIA Triad And 3 A's of Security
CIA Triad: C = Confidentiality I = integrity A = Availability
- Confidentiality: Information has not been disclosed to unauthorized people.
- Integrity: Information Has not been modified or altered without proper authorization.
- Availability: Information is able to be stored accessed or protected at all times.
3 A's of Security: A's = Authentication, Authorization, Accounting
- Authentication: When a person's identity is identity is established with proof and confirmed by system.
- Authorization: Occurs when a user is given access to a certain piece of data or certain area of building.
- Accounting: Tracking of data, computer usage, network resources.
3. Security Threats And Mitigation Threats
Security Threats:
- Malware: Short hand term for malicious software.
- Unauthorized Access: Access to a computer/system resources with permission or concent of the owner.
- System Failure: Occurs when a computer or an individual application fails.
- Social Engineering: Act of manipulating users into reveling confidential information or performing other detrimental actions.
Mitigation Threats:
- Physical Control (Not Talking about sexual things of course)
- Technical Control
- Administrative Controls.
-
These are obvious so need to explain :)
-
There is a whole section upcoming no need to cry bitch.
4. Types Of Hackers And Threats Actors
5 Types Of People:
- White Hats: Non malicious hackers who attempts to break into a companies systems at there request.
- Black Hats: Malicious hackers who break into computer systems and networks without authorization or permission.
- Gray Hats: Hackers without any affiliation to a company that attempts to break into a company's network but risks the by doing so.
- Blue Hats: Hackers who attempts to hack into a network with permission of the company but are not employed by the company. (example: Bug Hunters)
- Elite: Hackers who find and exploit vulnerabilities before anyone else does. They Make their own tools and exploits. it is said that 1 out of 10000 people is a elite.
Threat Actors:
- Script Kiddie: Hackers with little to no skills who only use the tools and exploits written by others.
- Hacktivists: Hackers who are driven by a cause like social change, political agenda, and sometimes even terrorism. Most Well known Hacktivists Group is Anonymous.
- Organized Crime: Hackers who are part of a crime group that is well funded any highly sophisticated.
- Advanced Persistent Threats: Highly trained and funded group of hackers(often by nation states) with convert and open-source intelligence at their disposal.