Chapter 1 Flashcards
What are the 3 objectives in CS
Confidentiality, integrity and availability. - CIA Triad
What does the confidentiality stand for
Confidentiality making sure only authorised personal are able to access the system/information.
What does the integrity stand for
Making sure no unauthorized modifications are done both intentionally and unintentionally. They may try to utilise certain scenarios which can weaken the integrity of the system such as a power spike which can cause corruption of information.
What does the availability stand for
Ensuring that information and systems are ready to meet the needs of authorized personal whenever requested. Threats may come from attackers seeking to disrupt the access
Give Examples of Confidentiality Controls
Security Controls are Firewalls, Access control lists and encryption
Give Examples of Integrity Controls
Hashing, integrity monitoring solution
What is hashing
Hashing is the practice of transforming a given key or string of characters into another value for the purpose of security
Give Examples of Availability Controls
Fault Tolerance, Clustering and backups.
what is Fault Tolerance and Clustering
Fault Tolerance: is a process that enables an operating system to respond to a failure in hardware or software.
Clustering: Cluster analysis simply means grouping data points that are similar to each other and are found throughout the network in order to reveal hidden and unusual patterns of activity and detect cyber security attacks
What does the DAD triad stand for
Disclosure: Alteration: Denial. These are 3 different types of threats.
What does the Disclosure mean
The exposure of sensitive information to unauthorized personal AKA data loss. This violates the first part of the CIA triad (Confidentiality) Attackers may gain access to sensitive information can remove it from the organization which is known as data exfiltration.
Define Alteration
Unauthorized modification of data and violates integrity. Attackers may be using it to seek financial gain or modifying documents.
What is a bit flip
A natural activity causing a power surge which can cause a bit flip which modifies stored data.
What does the denial stand for in DAD triad
Disruption of availability, Such as DDoS attack. This can happen accidently such as failure of critical server of natural activity.
Define Breach Impact
There are different types of incidents which may occur, Example: Financially, Reputational. Strategic, Operational and compliance.
Define Financial Risk
Monetary Damage to the company such as worker losing laptop or rebuilding data centre after its been destroyed
Define Reputational Risk
How your public image will be, good will among customers, suppliers and stakeholders.
What is PII
Personally Identifiable Information(PII): Name, DOB, SSN, Passport data
Define Strategic Risk
Risk that an organization will become less effective in meeting its major goals and objectives due to breach