Chapter 1 Introduction Flashcards
blackout
A long term interruption (outage) in electrical power availability.
McCumber cube CNSS
policy-education-technology
confidentiality-integrity-availability
storage-processing-transmission
host intrusion detection and prevention system ( HIDPS)
alerts security administrators when a critical file was modified or deleted
weakness of CNSS
- omits the discussion guidelines and policies that directs the implementation of controls.
- in HIDPS example it concerns only the infosec community but not the other communities
CNSS main purpose is to identify infosec gaps.
CIA plus
privacy identification authentication authorisation accountability
measures for confidentiality
information classification secure storage application of security policies education of info custodians and endusers cryptography (encryption)
measures for integrity
- checking size, cash value or checksum of a file can help to see whether a virus or worm changed the integrity
- low voltage signal carrying a digital bit can cause the recording of data incorrectly.
- during transmission; algorithms, hash values, and error-correcting codes ensures integrity.
Measures for availability
- availability when needed by authorised user, not for everyone.
- for library presenting identification can help to see the collection in appropriate language and formats.
measures for privacy
-information will be used only in ways approved by the provider.
- collecting and combining information from several different sources
- > information aggregation
- Identification
- Authentication
- Authorisation
- Accountability
- user ID
- secure ID, password
- access to creating, reading, writing, deleting
4.activity can be attributed to a person or automated process…. audit logs..
attack….an act exploit..a technique loss… a single instance threat.. has the potential threat agent.. the specific instance or a component of threat vulnerability… a potential weakness
.
threat vs attack
always present - exist only when a specific act may cause a loss.
example: threat of thunderstorm during summer is always present in some areas. but attack and its potential risk of loss exist only the duration of actual thunderstorm.
prioritisation of threat
- based on the particular security situation
- organisational strategy regarding risk
- exposure level of asset
most common intellectual property breach
unlawful use or duplication of software
availability distruption
- internet service issues
- communication and other
- power irregularities:
1. Black out
2. Brown out
3. fault
4. sag
5. spike
6. Surge
- internet service issues - SLA can be used
- communication and other .. water, trash pickup, gas, telephone…
- power irregularities… UPS can be used
- black out - LT cut
- brown out - LT reduction
- fault - ST error
- sag - ST decrease eg. when turning on air conditioning
- spike - ST increase eg. when turning off air conditioning
- surge - LT increase eg. lightening