Chapter 1 - Introduction to Information Security Flashcards

1
Q

Learning Objectives

A

Upon completion of this material, you should be able to:

  1. Define information security
  2. Recount the history of computer security and how it evolved into information security
  3. Define key terms and critical concepts of information security
  4. List the phases of the security systems development life cycle
  5. Describe the information security roles of professionals within an organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Security Definition

A

a well-informed sense of assurance that the information risks and controls are in balance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Origins of information security

A

Started around the Second World War and continued on into the Cold War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ARPA & why was it created?

A

Advanced Research Project Agency 1960s to examine feasibility of redundant networked communications

Larry Roberts- ARPANET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARPANET goal

A

The primary objective was to develop networking and resource sharing.

In its initial stages it had no security for dial-up connections (AKA authorization/passwords)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What was the Rand Report R-609? during what decades? and what was its major significance?

A

This was the paper that started the study of computer security and identified the role of management and policy issues in it

70s & 80s

Shift from physical security to information security: securing the data, limiting random/unauthorized access to the data, and tasking people directly with these duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is MULTICS?

A

Multiplexed information and computing service

Several key players of MULTICS created UNIX primarily for text processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

90s

A

Internet became the first global network of networks

93 DEFCON conference for IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name 6 layers for security/protection:

A
  1. Operations
  2. Physical infrastructure
  3. People
  4. Functions
  5. Communications
  6. Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIA Triangle

A

CIA -

Confidentiality

Integrity

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CNSS Security Model

The McCumber Cube

A

Committee on National Security Systems

Confidentiality

Integrity

Availability

Policy Education Tech

Storage/Processing/Transmission

This graphic informs the fundamental approach of the chapter and can be used to illustrate the intersection of information states (x-axis), key objectives of C.I.A. (y-axis), and the three primary means to implement (policy, education, and technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information Systems (IS) definition

A

•is the entire set of people, procedures, and technology that enable business to use information.

–Software

–Hardware

–Data

–People

–Procedures

– Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security as a balance b/w x and x

A

balance between protection and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Approaches to IS Implementation

A
  1. Bottom-up (grassroots effort) - rarely works due to little support and organizational staying power. Does have the advantage of having the technical expertise of individual administrators on its side.
  2. Top-down - carried out by upper mgmt. - policies, procedures, and processes, goals, and accountability. The most successful approach is referred to as systems development life cycle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the SDLC - systems development life cycle

A
  • ): a methodology for the design and implementation of an information system
  • Methodology: a formal approach to solving a problem based on a structured sequence of procedures
  • Using a methodology:

–Ensures a rigorous process with a clearly defined goal

–Increases probability of success

Traditional SDLC consists of six general phases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 6 stages of the SDLC

A
  1. Investigation
  2. Analysis
  3. Logical Design
  4. Physical Design
  5. Implementation
  6. Maintenance and change

IALPIM

(inside ankle bone low practically immobilizes man)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SecSDLC

A

Using the same phases of SDLC to identify specific threats and create specific controls that counter them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Software Assurance (SwA)

CBK

A

Need to include planning for security obj. in SDLC used to create systems.

Common body of knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identified security principles:

  1. –Economy of mechanism
  2. –Fail-safe defaults
  3. –Complete mediation
  4. –Open design
  5. –Separation of privilege
  6. –Least privilege
  7. –Least common mechanism
  8. Psychological acceptability
A

Economy of mechanism: Keep the design as simple and small as possible.

Fail-safe defaults: Base access decisions on permission rather than exclusion.

Complete mediation: Every access to every object must be checked for authority.

Open design: The design should not be secret, but rather depend on the possession of keys or passwords.

Separation of privilege: Where feasible, a protection mechanism should require two keys to unlock, rather than one.

Least privilege: Every program and every user of the system should operate using the least set of privileges necessary to complete the job.

Least common mechanism: Minimize mechanisms (or shared variables) common to more than one user and depended on by all users.

Psychological acceptability: It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NIST Approach to Securing SDLC

maximizes return on investment through (4:)

NIST - National Institute of Standards and Technology

A
  1. –Early identification and mitigation of security vulnerabilities and misconfigurations
  2. –Awareness of potential engineering challenges
  3. –Identification of shared security services and reuse of security strategies and tools
  4. –Facilitation of informed executive decision making
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CIO

CISO

A

Chief information officer - advises the senior executives on strategic planning

Chief information security officer - primarily assesses, manages, and implements IS and reports directly to CIO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data owners

A

Members of senior management who are responsible for the security and use of a particular set of information. The data owners usually determine the level of data classification (discussed later), as well as the changes to that classification required by organizational change. The data owners work with subordinate managers to oversee the day-to-day administration of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data custodians

A

Working directly with data owners, data custodians are responsible for the information and the systems that process, transmit, and store it. Depending on the size of the organization, this may be a dedicated position, such as the CISO, or it may be an additional responsibility of a systems administrator or other technology manager. The duties of a data custodian often include overseeing data storage and backups, implementing the specific procedures and policies laid out in the security policies and plans, and reporting to the data owner.

24
Q

Data Users

A

Everyone in the organization is responsible for the security of data, so data users are included here as individuals with an information security role.

25
Q

3 Views of Information Security

A
  1. art
  2. science
  3. social science
26
Q

Who was Robert M. Metcalf and what was the importance of his work?

A

Brought awareness to the risks and vulnerabilities of ARPANET

27
Q

Information Security as defined by CNSS

in book

A
28
Q

Components of information security

House Diagram

A

Base Level:

Confidentiality, Integrity, Availability

Columns:

Computer/Data/Network Security

Roof:

Policy, Information Security and Governance to ensure management of information security

29
Q

Information Security

A

Protection of CIA (confidentiality, integrity, and availability)

30
Q

Subject and Object of an attack

A
31
Q

Technology Stack

A
32
Q

Information Systems (IS)

A

The combination of software, hardware, data, people, procedures,

33
Q

methodology

A

A methodology is a formal approach to solving a problem by means of a structured sequence of procedures.

34
Q

SDLC Waterfall Methodology (6)

A
  1. Investigation
  2. Analysis
  3. Logical Design
  4. Physical Design
  5. Implementation
  6. Maintenance and Change

Note: repeat when system is no longer viable

35
Q

community of interest

A

a community of interest is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives. While there can be many different communities of interest in an organization, this book identifies the three that are most common and that have roles and responsibilities in information security

36
Q

What are the 3 most common communities of interest found with Information Security?

A
  1. Information security management and professionals
  2. Information technology management and professionals
  3. Organizational management and professionals
37
Q

Confidentiality

Integrity

Availability

A

Confidentiality: Only authorized users and processes should be able to access or modify data

Ex. of managing confidentiality: access control lists, volume, and file encryption, and Unix file permissions.

Integrity: Data should be maintained in a correct state and nobody should be able to improperly modify it, either accidentally or maliciously. Make it so that it is possible to reverse the damage caused by a bad actor.

Availability: Authorized users should be able to access data whenever they need to do so.

Install redundancies to allow access through power outages, connection problems, hardware failures, etc.

38
Q

Access

A

a subject or object’s ability to use, manipulate, modify or affect another subject or object.

39
Q

Asset

A

organizational resource being protected

40
Q

Attack

A

an intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.

41
Q

Control/Safeguard/Countermeasure

A

are the security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization

42
Q

Exploit

A

a technique used to compromise a system

43
Q

Exposure

A

a condition or state of being exposed/vulnerable

44
Q

Loss

A

A single instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use.

45
Q

Protection Profile or Security Posture

A

entire set of controls and safeguards that the organization takes to protect the asset

46
Q

Risk

A

the probability of an unwanted occurrence

47
Q

Subjects and Objects

A

A PC can be either an agent entity used to conduct an attack or the target entity.

Subject of the attack

Object of the attack

48
Q

Threat

A

a category of objects, people, or other entities that represents a danger to an asset.

49
Q

Threat Agent

A

the specific instance or a component of a threat.

50
Q

Vulnerability

A

weaknesses or faults in a system or protection mechanism that expose information to attack or damage.

51
Q

Availability of Information

A

Enables users who need access to do so without interference or obstruction and in the required format. The information is said to be available to an authorized user when and where needed and in the correct format

52
Q

Accuracy of information

A

Free from mistake or error and having the value that the end user expects. If the information contains a value different from what the user expects due to intentional or unintentional modification of its content, the information is said to no longer be accurate.

53
Q

Authenticity

A

quality of being original, as opposed to being a reproduction or fabrication.

Information is authentic when it is the information that was originally created, placed, stored or transferred.

54
Q

Confidentiality of information

A

The quality or state of preventing disclosure or exposre to unauthorized individuals or systems.

55
Q

Utility

A

the quality of having value for some purpose or end. Information has value when it serves a particular purpose.

This means that if information is available, but not in a format that is useful to the end-user, it is not useful.

56
Q

Possession

A

Having ownership or control of some object or item.

A breach of confidentiality always results in a breach of possession. However, a breach in possession does not always result in a breach in confidentiality.