2022 Paper Flashcards
What are the three tiers of Risk Management Hierarchy?
Tiers 1 and 2 describe systemic information security risks while tier 3 is used to support the implementation of a framework. Tier 1 is ‘Organisational’, Tier 2 is ‘Mission/Business Process Level’ and Tier 3 is ‘Information System Level’
What types of Threat Source are there?
Adversarial (Individuals, groups or organisations seeking to exploit), Accidental (Error by individuals), Structural (Failures of equipment or controls), Environmental (Natural Disasters)
In John Adams’s book, what are the three types of risk?
Risks perceived directly (e.g. climbing a tree, riding a bike), Risks perceived through science (e.g. cholera, you need a microscope to see or understand) and Virtual Risks (Scientists don’t know or don’t agree e.g. pesticide)
What is the difference between a threat source and a threat event?
A threat source is a situation that could lead to the exploitation of a vulnerability or the intent to, while a threat event is the actual situation happening
What is MDM?
Mobile Device Management, a software which, when installed on a device, allows the organisation a certain level of control over the device such as monitoring and supervision
What is MAM?
Mobile Application Management, a software which, when installed on a device, allows the organisation to control what software is on the device, allowing updates, installs, and deletion of software
What is Biographical Identity?
Education, Qualifications, Where you lived, employment, any information that can be combined to identify someone
What are the five components of Identity Management Systems?
Data Repository components, Security Components, Lifecycle Components, Consumable Value Components, Management Components
What are Data Repository Components?
Storage and Management of identity information
What are Security Components?
Authentication Providers, Authorisation Providers and Auditing Providers
What are Lifecycle Components?
Provisioning, the automation of all procedures and tools to manage the lifecycle of an identity, and Longevity, the creation of a historical record of an identity
What are Consumable Value Components?
Single Sign-On, reducing number of usernames and passwords, Personalisation, preference management, and Self Service, enable users to self register for access to business services
What are Management Components?
User Management, managing user profile and preference, Access Control Management, managing authentication and authorisation, Privacy Management, implements privacy, and Federation Management, establishment of trusted relationships
What is Federated Identity Management?
Federated Identity Management systems support multiple identity providers and a distributed storage, allows multiple organisations to use identity storage, and use certain providers
What are the issues with Federated Identity Management?
Identities can change, there could be a difference between federated identity and local identity to a company
What are the 3 Service Models for Cloud Computing?
Software as a Service (SaaS), the consumer uses an application which runs under the provider’s infrastructure, Platform as a Service (PaaS), the consumer can create their own applications on the infrastructure, and Infrastructure as a Service (IaaS), complete freedom by being given their own infrastructure to make
What are the 4 Deployment Models for Cloud Computing?
Private Cloud, exclusive use for a single organisation, Community Cloud, exclusive use for a community of users, Public Cloud, open use by the general public, and Hybrid Cloud, a mixture of previous models
What are the two key components of a supply chain?
Physical, the network of organisations, the linkages, the different processes and activities that produce value and goods, and Information, the full set of elements necessary to collect information, transform this information into data, and distribute this information
What are the three main deployment models for Identity Management Systems?
Silos, Walled Gardens, Federations
What is the Silos deployment model for Identity Management Systems?
Identity Management Environment is put in place by a single entity for a fixed user and resource community
What is the Walled Gardens deployment model for Identity Management Systems?
A closed community of organisations with a single identity management system deployed to serve the common user community of a collection of businesses.
What is the Federations deployment model for Identity Management Systems
A truly distributed model with the main difference from Walled Gardens being that there is no single entity governing the system, and instead having multiple Identity Providers (IdP)