ELI5: What are Security Concepts?

Security concepts are the basic rules everyone follows to keep information safe — kind of like the safety rules you learn on the first day of school. They include ideas like “only share secrets with people who need to know,” “don’t give anyone more power than they need,” and “keep records of who did what.” These simple ideas guide every decision about protecting computers and data, no matter how big or complicated the system gets.

Overview

Security concepts form the bedrock of the CompTIA Security+ exam, encompassing the principles, terminology, and frameworks that guide all cybersecurity practices. Understanding these foundational ideas is essential for grasping how threats are identified, risks are managed, and systems are protected across an organization.

Key Concepts

  • Confidentiality, Integrity, Availability (CIA) — the three pillars of information security; every control maps back to at least one of these (see cia-triad)
  • Non-repudiation — ensures that a party cannot deny having performed an action; achieved through digital signatures, logging, and audit trails
  • Least privilege — users and processes should only have the minimum permissions necessary to perform their function
  • Separation of duties — no single person should control all aspects of a critical transaction, reducing fraud and error risk
  • Need to know — access to information is restricted to those who require it for their role
  • Due diligence vs. due care — due diligence is researching and understanding risks; due care is acting responsibly to mitigate them
  • Security through obscurity — relying on secrecy of design rather than robust controls; considered insufficient on its own
  • Open design principle — security mechanisms should not depend on secrecy of implementation

Exam Tips

Remember

The CIA triad appears in nearly every domain. When evaluating a scenario question, ask: “Which element of CIA is being threatened?” This frames the correct answer quickly.

Least Privilege vs. Need to Know

Least privilege limits permissions; need to know limits information access. Both reduce attack surface but operate at different levels.

Connections

  • Built upon cia-triad as the core framework for evaluating security posture
  • Implemented through defense-in-depth to create layered security controls
  • Enforced by access-control-models which define how least privilege and separation of duties are applied
  • Directly informs risk-management decisions about which controls to implement

Practice Questions

Scenario

See case-security-concepts for a practical DevOps scenario applying these concepts.