Chapter 1 - Information Assurance, Risk Management, Security Controls, Governance, Ethics Flashcards
What does CIA stand for?
Confidentiality
Integrity
Availability
What types of environment does the CIA triad apply to? (Name two.)
Logical
Physical
Confidentiality means…
Data should only be available to authorised parties.
Integrity means…
The data must be correct, whole, and not in any way corrupted.
Availability means…
The data must be available to authorised users when it is required.
Give an example of how we protect Confidentiality.
Physical example: locks, perimeters, safes.
Technical/logical: encryption, usernames, passwords, access controls, file permissions, authentication.
The technical realm is also called the …
Logical realm
Why is Integrity important?
We want to ensure that files are managed and authorised. We need to make sure a file is not accidentally changed or corrupted, or changed maliciously by a threat actor.
What technical control can be used to protect Integrity?
Hashing- this adds a fingerprint to a file.
In the physical world, what can help protect Availability?
A back-up generator which keeps the electricity supply going if the main supply has gone down.
Name the three types of Security Controls
Physical
Technical
Administrative
Give an example of a Physical Control…
Physical hardware devices, e.g badge-readers, lift passes
Architectural features of buildings and facilities that address process-based security needs.
Give an example of a technical/logical control…
Security controls that computer systems and networks directly implement.
Give an example of an administrative control…
Directives
Guidelines
Policies
Procedures
How do you calculate the level of risk?
Probability + Impact = Level of Risk
What is an Asset?
Anything of value that is owned by an organisation. Includes information systems and physical property and intellectual property.
Data is an asset, as is a laptop or a mobile phone.
What is a baseline?
A documented, lowest level of security configuration allowed by a standard or organisation.
What is biometric data?
The biological characteristics of an individual, such as a fingerprint, hand geometry, voice or iris patterns.
What is encryption?
The process and act of converting plain text to ciphertext. Sometimes called enciphering
Define Governance
The process of how an organisation is managed - e.g. how decisions are made, and what policies, roles and procedures are used to make those decisions
Define Impact
The magnitude of harm that could be caused by a threat’s exploitation of a vulnerability.
Define Multi-Factor Authentication
When you use two or more distinct instances of the three factors of authentication (something you know, something you have, something you are) for identity verification
What is Non-Repudiation?
The inability to deny taking an action such as creating information, modifying it, approving information or sending/receiving a message.
What is NIST?
Part of the US Dept of Commerce. It addresses the measurement infrastructure within science and technology efforts within the US federal government. It sets standards in various areas, including information security within the Computer Security Resource Center of the Computer Security Divisions.
What is Privacy?
The right of an individual to control the distribution of information about themselves.
What is Risk?
A possible event which can have a negative impact on an organisation.
What is Risk Management?
The process of identifying,evaluating and controlling threats, including all the phases of risk context (or frame), risk assessment, risk treatment and risk monitoring.