1. Information Security Flashcards
P.I.I.
Personal Identifiable Information
Information Security
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Eugene Spafford quote
“The only truly secure system is one that is powered off…”
C.I.A. Triad
The Confidentiality, Integrity, and Availability Triad
Negative of the C.I.A. Triad
The D.A.D. Disclosure, Alteration, and Denial
C. of the C.I.A. Triad
Confidentiality - Ability to protect our data from those who are not authorized to view it.
I. of the C.I.A. Triad
Integrity - Ability to prevent people from changing your data in an unauthorized or undesirable manner. You need means to prevent AND reverse unauthorized change. RELIABILITY
A. of the C.I.A. Triad
Availability - Ability to access our data when we need it.
DoS Attack
Denial of Service Attack. Attacks the A. of the C.I.A. Triad.
The Parkerian Hexad
C.I.A. Triad + Possession/Control, Authenticity, and Utility (C.I.A.U.P.A)
I. in the Parkerian Hexad
Integrity does NOT account for authorized, but incorrect, modification of data
P. of the Parkerian Hexad
Possession - Physical disposition of the media on which the data is stored
A. of the Parkerian Hexad (Au)
Authenticity - Whether you’ve attributed the data in question to the proper owner
U. of the Parkerian Hexad
Utility - How useful the data is to you. NOT BINARY
Types of attacks (4)
Interception, Interruption, Modification, and Fabrication
What does an Interception attack compromise of the C.I.A. Triad?
Confidentiality - Unauthorized user access
What does an Interruption attack compromise of the C.I.A. Triad?
Integrity and Availability - Assets unusable/unavailable
What does a modification attack compromise of the C.I.A. Triad?
Integrity and Availability - Tampering with assets
What does a Fabrication attack compromise of the C.I.A. Triad?
Integrity and Availability - Generating data, processes, communications, or other similar material with a system
Risk
Takes into account the value of the asset to calculate the impact
Steps of Risk Management (5)
Identify assets > Identify threats > Assess vulnerabilities > Assess risks > Mitigate risks (Repeat as needed)
Types of controls (3)
Physical, Logical, and Administrative