CH 1. Security Governance Through Principles and Policies Flashcards
Confidentiality (Definition)
- measures used to ensure the protection of the secrecy of data, objects, and resources.
- focuses security measures on ensuring that no one other than the intended recipient of a message is able to receive/read it.
What is the goal of Confidentiality?
- prevent unauthorized access to data
- encrypts data at rest (stored on a disk)
- encrypts data on the network (in transit)
What does Confidentiality protection provide?
- provides a means for authorized users to access and interact with resources
- actively prevents unauthorized users from accessing and interacting with resources
What is an access control?
- the management of a relationship between subjects and objects
What is an “object” in a security relationship?
- the passive element in a security relationship
- such as files, computers, network connections, and applications
What is an “subject” in a security relationship?
- the active element in a security relationship that acts upon or against an object
- such as users, programs, and computers
What are examples of attacks used to violate confidentiality?
- capturing network traffic
- stealing passwords
- social engineering
port scanning - shoulder surfing
- sniffing
- escalation of privileges
What are examples of human error that results in a violation of confidentiality?
- not encrypting data transmissions
- no securing access points
- backdoors in code
- misrouted faxes
- documents left on printers
- not locking terminals
What countermeasures can help ensure confidentiality against possible threats?
- encryption
- network traffic padding
- access controls
- authentication procedures
- data classification
- personnel training
- IPsec tunnel for VPN
- Multi-factor Authentication
Sensitivity (Definition)
- refers to the quality of information
- could cause harm if disclosed
Discretion (Definition)
- an act or decision where an operator can influence or control disclosure in order to minimize harm or damage
Criticality (Definition)
- the level to which information is mission critical
- the higher the level of criticality, the more likely the need to maintain the confidentiality of the information
Concealment (Definition)
- the act of hiding or preventing disclosure
- often viewed as a means of cover, obfuscation, or distraction
Security Through Obscurity (Definition)
- the concept of attempting to gain protection through hiding, silence, or secrecy
- not considered a valid security measure, but may still have value
Secrecy (Definition)
- the act of keeping something a secret or preventing the disclosure of information
Privacy (Definition)
- refers to keeping information confidential that is personally identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed
Seclusion (Definition)
- involves something in an out-of-the-way location
- this location can also provide strict access controls
Isolation (Definition)
- the act of keeping something separated from others
- Isolation can be used to prevent commingling of information or disclosure of information (confidentiality)
Integrity (Definition)
- the concept of protecting the reliability and correctness of data
- prevents unauthorized alteration of data
- ensures that data remains correct, unaltered, and preserved
What does properly implemented Integrity protection provide?
- a means for authorized changes while protecting against intended and malicious unauthorized activities (such as viruses or intrusions) as well as mistakes made by unauthorized users.
What does a security mechanism that protects Integrity provide?
- high level of assurance that the data, objects, and resources are unaltered from their original protected state.
- prevents alterations while the object is in storage, in transit, or in process
What are the three perspectives that Integrity is examined from?
- preventing unauthorized subjects from making modifications
- preventing authorized subjects from making unauthorized modifications (mistakes)
- maintaining the internal and external consistency of objects so that their data is correct
What are examples of attacks on data Integrity?
- viruses
- logic bombs
- unauthorized access
- errors in coding and applications
- malicious modifications
- intentional replacement
- system back doors
What are examples of unauthorized changes made by authorized users?
- modifying or deleting files
- entering invalid data
- altering configurations
- errors in commands, codes, and scripts
- introducing a virus
- executing malicious code