CIA Triad
The CIA triad defines the three core security objectives: Confidentiality — ensuring data is accessible only to authorized parties. Encryption, access controls, and authentication protect confidentiality. Integrity — ensuring data is accurate and unmodified. Hashing, digital signatures, and checksums verify integrity. Availability — ensuring systems and data are accessible when needed. Redundancy, backups, and DDoS protection support availability.
AAA (Authentication, Authorization, Accounting): Authentication — verifying identity ('who are you?'). Authorization — determining what the authenticated identity can access ('what can you do?'). Accounting — recording what was done ('what did you do?'). RADIUS and TACACS+ implement AAA for network access. Accounting provides the audit trail for compliance.
Threat Categories and Concepts
Vulnerabilities are weaknesses that can be exploited. Threats are potential dangers that could exploit vulnerabilities. Risk = likelihood × impact. Controls reduce risk by reducing likelihood (preventive) or impact (responsive).
Threat actors: Script kiddies (low skill, uses existing tools), hacktivists (politically motivated), cybercriminals (financial gain), nation-states (most sophisticated, often APT — Advanced Persistent Threat), insider threats (employees with legitimate access misusing it).
Attack surface: the total area of the system exposed to potential attackers — every open port, service, user account, physical access point, and connected device. Reducing attack surface (attack surface reduction) is a fundamental security principle: disable unused services, close unused ports, remove unnecessary user accounts, minimize software installed.
Defense in depth: multiple overlapping security controls so that failure of one control is compensated by others. If a firewall is bypassed, IDS can still detect. If IDS misses, endpoint AV can catch. No single security control is perfect — layered security provides resilience.
Security Control Types
By purpose: Preventive (stop attacks before they succeed — firewall, encryption, access controls). Detective (identify attacks occurring — IDS, logging, monitoring). Corrective (recover from attacks — incident response, backups). Deterrent (discourage attacks — warning banners, visible cameras). Compensating (alternative control when primary is unavailable). Directive (policies and procedures).
By category: Technical/logical (software and hardware — firewalls, encryption, ACLs). Administrative (policies, procedures, training). Physical (locks, cameras, badge access, guards). Defense in depth uses all three categories at multiple layers.