Security Models
Encryption & Data
CIA Triad
Cyber Threats
Access & Control
100

grants specific users access to a broader set of resources than ordinary users.

privileged access security model

100

advocates granting users only the access they need to perform their job responsibilities.

least privilege security principle

100

assumes that no user or device can be trusted by default.

zero-trust architecture security model

100

refers to an organization's ability to withstand and recover quickly from cyber attacks.

Cyber resilience

100

a network device that regulates traffic based on predefined security rules.

firewall

200

the process of converting data into an unreadable format by using an encryption algorithm.

Encryption

200

the reverse process that uses an encryption key to restore encrypted data back to its original form.

Decryption

200

Confidentiality, Integrity, and Availability: these three principles form the foundation of the widely used model for developing effective security systems.

CIA Triad

200

keeping important information safe and secret.

Confidentiality

200

keeping data accurate and trustworthy.

Integrity

300

making sure that systems and services are always accessible and ready for use by the right people when needed.

Availability

300

refers to the measures and processes implemented to manage and mitigate security risks.

Control

300

relates to adhering to industry regulations, legal requirements, and organizational policies.

compliance

300

In a cloud model, the cloud service provider is responsible for securing the infrastructure, network, and physical facilities.

The customer is typically responsible for securing their data, applications, user access, and configurations.

responsibility

300

Cloud security allows organizations to easily scale their resources up or down based on demand.

scalability

400

a skilled manipulator is seeking to extract confidential system information from unsuspecting individuals.

social engineering

400

skillfully crafted and tailored emails that mimic authenticity to deceive their targets to collect personal details about you, your employees, or your students.

phishing attacks

400

malicious software, aiming to disrupt operations, inflict damage, or gain unauthorized access to computer systems.

malware

400

where crucial files are held hostage until a considerable ransom is paid.

ransomware

400

verifies the identity of users or systems that seek access and involves presenting unique credentials, such as passwords, physical tokens, or biometric data like fingerprints or voice recognition.

Authentication

500

determines what that user or system is allowed to do within the system.

authorization

500

create and manage user accounts, assign roles to users, grant and revoke permissions to resources, audit user activity, and monitor your security position.

Identity and Access Management (IAM)

500

a cyber attack that uses multiple compromised computer systems to flood a target with more traffic than it can handle, which causes a denial of service to legitimate users.

DDoS (distributed denial-of-service)

500

all about protecting your organization's data and systems in the cloud.

SecOps

500

refers to the legal concept that data is subject to the laws and regulations of the country where it resides.

Data sovereignty

M
e
n
u