1 - Security Governance Through Principles and Polcies Flashcards
CIA Triad
Confidentiality
Integrity
Availability
Confidentiality
Objects are not disclosed to unauthorized subjects
Integrity
Objects retain their veracity and are intentionally modified by authorized subjects
Availability
Authorized subjects are granted uninterrupted access to objects
Identification
Process to establish an identity and accountability
Authentication
Process of verifying or testing that a claimed identity is valid
AAA
Authentication
Authorization
Accountability
Authorization
Activity, access, rights, or privileges are granted to to an authenticated identity
Auditing
Monitoring subjects to be held accountable for their actions while authenticated on a system
Detecting unauthorized or abnormal activities on a system
What is the importance of Accountability?
Security policies can only be enforced if subjects are held accountable for their actions
Nonrepudiation
Subject of an activity cannot deny that the event occurred
What are the three types of security management planning?
Strategic - long term
Tactical - mid term
Operational - short term
What are the elements of a security policy structure?
Policy
Standards/Baseline
Guidelines
Procedures
Layering
Use of multiple controls against security threats
Abstraction
Collection of similar elements into groups or classes that are assigned security controls/restrictions as a collective