Chapter 1 Flashcards
Different Types of Security Decisions
- Rule Based Decisions:
- Follow pre-existing rules
- Relativistic Decisions:
- Make decisions based on surrounding environment
- My friend does it, so I do as well
- Requirements Based Decisions:
- Look at risks and choose security measures accordingly
- Reasses as part of lifecycle
Risk Management Framework (RMF)
1) Establish system and security goals
2) Select Security Controls
3) Implement Security Controls
4) Asses security controls
5) Authorize the information system
6) Monitor security controls
repeat
Note: not really geared for small enterprises
CIA Properties
1) Confidentiality
2) Integrity
3) Availability
Levels of Impact
1) N/A
2) Low = noticeable impact
3) Moderate = significant damage
4) High = Major catastrophic damage
Example RMF Categorization
Website to publish public info:
Confidentiality: N/A
Integrity: Low
Availability: Low
Proprietor’s RMF (PRMF)
Shorter, requirements-based assessment
1) Establish System and Security Goals
2) Select security controls
3) Validate the information system
4) Monitor security controls
PRMF Risk Assessment
3 major steps
1) Identify Risks: assets, threat agents, attacks
2) Prioritize Risks: estimate relative impacts (impact X likelihood)
3) Establish requirements: identify security goals to address the highest-priority risks
Continuous Improvement (basic principle)
Identify basic goals, measure success, adjust our work to beter achieve our goals.
Assets
What is valuable to an entity, what we are trying to protect. We protect them with a boundary.
Vulnerabilities
Openings in the boundaries around our assets.
Threat Agent/Attacker
Individual or group that can manifest a threat. Who is doing the attacking.
Defense/Safeguard/Countermeasure
something protecting an asset
Compromised System
An attacked system that is unsafe to use.
Botnet
When you have a network of compromised systems that are all controlled by a single attacker.
Least Privilege (Basic Principle)
Restrict what people may do to an asset. Provide the minimum privileges required to a person so that they may successfully do their job.
Ex: key opens my store but not yours.