1 - Security Governance Flashcards
What is Confidentiality?
The concept of the measures used to ensure the protection of the secrecy of data, objects, and resources.
Object vs Subject
Object: passive element in a security relationship such as files, computers, and applications.
Subject: active element in a security relationship such as users, programs, and computers.
A subject acts upon an object.
The management of the relationship between objects and subjects is known as _access control_.
What is the CIA triad?
Confidentiality Integrity Availability
What is Integrity?
Protecting the reliability and correctness of data.
Availability
Authorized subjects granted timely and uninterrupted access to objects.
What are the components of AAA services?
Identification: subject professes an identity.
Authentication: the process of verifying or testing that the claimed identity is valid.
Authorization: ensures requested activity or access to an object is possible given the rights and privileges assigned to the identity.
Auditing: (or monitoring) programmatic means by which a subject’s actions are tracked and recorded for the purpose of holding the subject accountable for their actions while Authenticated on a system.
Accountability: linking a human to the activities of an online identity.
What is Layering?
Also known as Defense in Depth, the use of multiple controls in a series.
What is abstraction?
Where similar objects are put into groups, classes, or roles that are assigned security controls, restrictions, or permissions as a collective. Also defines what type of data an object can contain, what functions can be performed on them/by them, and what capabilities that object has.
What is Data Hiding?
Preventing data from being discovered or accessed by a subject by positioning the data in a logical storage compartment that is not accessible or seen by the subject.
What is encryption?
The art and science of hiding the meaning or intent of a communication from unintended recipients.
What is Security Governance?
The collection of practices related to supporting, defining, and directing the security efforts of an organization.
What is the most effective way to tackle security management planning?
Via the Top-Down Approach, where upper and senior management is responsible for initiating and defining policies for the organization. Middle management fleshes out security polices into stardards, baselines, guidelines, and procedures. Ops managers and/or security professionals implement the the configurations prescribed in the security management documentation. End users must comply with all security polices of an organization.
What position should lead the information security team?
Generally the Chief Information Security Officer (CISO), sometimes referred to as Chief Security Officer (CSO), but these 2 roles can be subpositions to each other depending on the organization. Sometimes also refered to as Information Security Officer (ISO).
What is the key factor of success for every security plan?
Approval by security management.
What are the different types of security plans?
- Strategic Plan: A long-term plan that defines organization’s security purpose. Should include a risk assessment.
- Tactical Plan: A midterm plan developed to provide more details on accomplishing the goals set forth in the strategic plan or crafted ad-hoc based on unpredicted events.
- Operational Plan: A short-term, highly detailed plan based on strategic and tactial plans.