Information Security Cheat Sheet
The core ideas of Information Security distilled into a single, scannable reference — perfect for review or quick lookup.
Quick Reference
CIA Triad
The three core principles of information security: Confidentiality (restricting access to authorized users), Integrity (ensuring data accuracy and trustworthiness), and Availability (ensuring reliable access to information when needed). This model serves as the foundational framework for designing and evaluating security controls.
Defense in Depth
A layered security strategy that employs multiple defensive mechanisms so that if one layer fails, others continue to provide protection. The approach combines physical, technical, and administrative controls at multiple levels of an organization's infrastructure.
Principle of Least Privilege
The security concept that users, processes, and systems should be granted only the minimum level of access necessary to perform their legitimate functions. This limits the potential damage from accidents, errors, or malicious actions.
Social Engineering
The manipulation of people into performing actions or divulging confidential information by exploiting psychological tendencies such as trust, fear, urgency, and authority. Social engineering bypasses technical controls by targeting the human element.
Encryption
The process of converting plaintext data into an unreadable ciphertext format using a cryptographic algorithm and key, ensuring that only authorized parties with the correct decryption key can access the original information. Encryption protects data both at rest and in transit.
Risk Management
The systematic process of identifying, assessing, and prioritizing threats and vulnerabilities to information assets, then applying controls to reduce the likelihood or impact of adverse events to an acceptable level. Risk can be mitigated, transferred, accepted, or avoided.
Multi-Factor Authentication (MFA)
An authentication method that requires users to provide two or more independent verification factors, typically something they know (password), something they have (security token or phone), and something they are (biometric). MFA significantly reduces the risk of credential compromise.
Incident Response
The organized approach to addressing and managing the aftermath of a security breach or cyberattack. The goal is to handle the situation so that damage is limited, recovery time and costs are minimized, and lessons are captured for future improvement.
Zero Trust Architecture
A security model based on the principle of 'never trust, always verify,' which assumes that threats exist both outside and inside the network. Every user, device, and network flow is authenticated, authorized, and continuously validated before being granted access to resources.
Vulnerability Management
The cyclical practice of identifying, classifying, remediating, and mitigating security vulnerabilities in systems and software. It includes regular scanning, patch management, and prioritization based on severity and exploitability.
Key Terms at a Glance
Get study tips in your inbox
We'll send you evidence-based study strategies and new cheat sheets as they're published.
We'll notify you about updates. No spam, unsubscribe anytime.