chapter 1+2 Information security and cloud secuity Flashcards
What is information system security?
Information system security (infosec) refers to the processes and methodologies involved with keeping information confidential, available, and assuring its integrity.
What are the key objectives of security?
The key objectives of security are Prevention, Detection, Response, and Recovery (PDRR).
Why is security important?
Security is important for protecting against threats, safeguarding assets, maintaining trust, ensuring compliance, and preventing financial loss.
What are tangible assets?
Tangible assets are physical, material objects that can be touched or measured, such as hardware and facilities.
What are intangible assets?
Intangible assets are non-physical resources that provide value but cannot be touched, such as data and brand reputation.
What types of assets should be secured?
Types of assets that should be secured include Information Assets, Physical Assets, Digital Assets, Network Assets, and Human Assets.
What is the relationship between different types of security?
Different types of security, such as information security, cybersecurity, internet security, network security, and web security, are interrelated and collectively form a layered approach to protecting assets.
What is the OSI Security Architecture?
The OSI Security Architecture considers three aspects: security attacks, security mechanisms, and security services.
What does confidentiality ensure?
Confidentiality ensures that computer-related assets are accessed only by authorized parties.
What is the goal of hardening systems?
The goal of hardening systems is to make it harder to exploit vulnerabilities, deterring attackers by increasing effort and reducing reward.
What is the significance of layered security?
A layered security approach combines multiple layers of protection to create a stronger defense, reducing overall risk if one layer fails.
What are primary information assets?
Primary information assets are data, information, or knowledge that has value, is organized, and enables the organization to operate business processes.
What are supporting, secondary information assets?
Supporting, secondary information assets include software, hardware, people, physical infrastructure, processes, and purchased services essential for making data available.
What is an organization in the context of security?
An organization intended to counter security attacks and make use of one or more security mechanisms to provide the service.
Examples include having signatures, dates, and needing protection from disclosure, tampering, or destruction.
What does the ‘C’ in CIA stand for?
Confidentiality: ensures that computer-related assets are accessed only by authorized parties.
What is data confidentiality?
Assures that private or confidential information is not made available or disclosed to unauthorized individuals.
What is privacy in the context of confidentiality?
Assures that individuals control or influence what information related to them may be collected and stored and by whom.
What does the ‘I’ in CIA stand for?
Integrity: means that assets can be modified only by authorized parties or only in authorized ways.
What is data integrity?
Assures that information and programs are changed only in a specified and authorized manner.
What does the ‘A’ in CIA stand for?
Availability: means that assets are accessible to authorized parties at appropriate times.
What is the impact of a loss of availability?
Disruption of access to or use of information or an information system.
What is authenticity in information security?
The property of being genuine and being able to be verified and trusted.
What is accountability in information security?
The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.
What is authentication?
Any process by which you verify that someone is who they claim they are.
What is non-repudiation?
Means that the sender or generator of information cannot deny that they did send or generate the information.
What is access control?
Only authorized parties can use specific resources.
What are the three levels of impact on organizations from a breach of security?
Low, Moderate, High.
What is the Hacker’s Triad?
DAD: Disclosure, Alteration, Destruction.
What is a vulnerability?
A weakness in the security system implementation or operation that can make assets corrupted, leaky, or unavailable.
What is a threat?
Capable of exploiting vulnerabilities and represents potential security harm to an asset.
What is an attack?
An action or series of actions to harm a system, leading to a violation of security policy.
What is a countermeasure?
Any means taken to deal with a security attack, ideally to prevent, detect, or recover from the attack.
What are the two types of attacks based on impact?
Passive attacks and Active attacks.
What is a passive attack?
Attempts to learn or make use of information from the system but does not affect system resources.
What is an active attack?
Attempts to alter system resources or affect their operation.
What is interception in the context of attacks?
Eavesdropping where an unauthorized party gains access to an asset, attacking confidentiality.
What is interruption in the context of attacks?
The action of preventing a message from reaching its intended recipient, attacking availability.
What is modification in the context of attacks?
An unauthorized party alters the content of a message, attacking integrity.
What is fabrication in the context of attacks?
An unauthorized party inserts counterfeit objects into the system, attacking authenticity.
What are the fundamental principles of information security design?
Isolation, Encapsulation, Least privilege, Economy of mechanism.