Chapter 1 Mod 1 Flashcards
Security Concepts of information Assurance, Risk Management Process, Security Controls, Governance Elements and Processes, ISC2 Code of Ethics
How does the CIA triad help in defining security, and why are these terms considered relevant and meaningful?
The CIA triad helps define security by focusing on Confidentiality, Integrity, and Availability, making security more understandable to management and users, and providing a clear purpose for security measures.
In the context of Confidentiality, what challenge do security professionals face when dealing with system users who are guests or customers?
Regulating access to protected data whilst permitting access to authorized users, especially when users may access the system from compromised devices
What is Personally Identifiable Information (PII), and how does it relate to the area of confidentiality?
Personally Identifiable Information (PII) refers to any data about an individual that could be used to identify them. It relates to confidentiality as it involves protecting sensitive information about individuals.
How is sensitivity defined in the context of confidentiality, and what role does it play?
Sensitivity is a measure of the importance assigned to information by its owner, denoting its need for protection.
Sensitive information, if improperly disclosed or modified, could harm an organization or individual.
What does Integrity measure, and how does it apply to data, systems, organizations, and people?
Integrity measures the degree to which something is whole, complete, internally consistent, and correct. It applies to data, systems, organizations, and people – ensuring accuracy and consistency.
What does Data integrity encompass, and why is it crucial for information?
Data integrity is the maintenance, assurance, accuracy and consistency of data over its life-cycle.
It is crucial for information to be free from improper modification, errors, or loss, ensuring its completeness.
How is the internal consistency of information relevant to data integrity?
The internal consistency of information ensures that information is correct on all related systems, displayed, and stored uniformly. It is a part of data integrity, requiring all instances of data to be identical in form, content, and meaning.
What is system integrity?
System integrity refers to maintaining a known good configuration and expected operational function.
To achieve this, maintaining a baseline (current state) and ensuring that the system always continues to be protected through transactions is crucial.
IBM definition: An operating system is said to have system integrity when it is designed, implemented and maintained to protect itself against unauthorized access, and does so to the extent that security controls specified for that system cannot be compromised
How is availability defined
Availability is defined as timely and reliable access to information and the ability to use it.
Why is availability not necessarily about systems and data being available 100% of the time?
Availability is not necessarily about systems and data being available 100% of the time. Instead, it means that systems and data meet the business requirements for timely and reliable access. Criticality is associated with availability, representing the importance an organization gives to data or an information system.
What are the foundational principles of the cybersecurity domain, and why is a comprehensive approach to maintaining them important?
The foundations of the cybersecurity domain are Confidentiality, Integrity, and Availability (CIA Triad). A comprehensive approach to maintaining them is crucial for ensuring robust cybersecurity.
Explain the concept of Confidentiality
why is it essential to protect personally identifiable information (PII)?
Confidentiality ensures that no private information is disclosed to unauthorized individuals.
It is essential to protect PII to safeguard the assets and information of large corporations or individuals, especially in sectors like banking, health care, or insurance.
What is the role of a security team in terms of confidentiality, and what is their goal?
The role of a security team is to protect assets or information. Their goal is to ensure the confidentiality of information, particularly safeguarding multiple personal identifiers in sectors like banking, health care, or insurance.
Define Integrity and its significance in information security.
Integrity ensures that information is not corrupted or changed without the owner’s permission. It confirms that the information is complete, accurate, and consistent with its legitimate use, playing a crucial role in information security.
What are the potential ramifications of interfering with the integrity of information?
financial losses, reputational damage, legal prosecution troubles, regulatory fines, and a profound erosion of consumer trust.
Interference can include suppressing, modifying, adding, transmitting, editing, deleting or otherwise damaging data, systems, and services.
What is the primary responsibility mentioned in the text regarding information security?
The primary responsibility is to maintain the security of information, ensuring that no one, unless authorized, changes any part of the protected information.
Why is Availability critical, and what can disrupt the availability of data?
Availability is critical because authorized users must have timely access to important information.
Cyberattacks, particularly ransomware attacks, can disrupt the availability of data by locking up systems and blocking access to vital information and services.
In the context of a ransomware attack, how is access typically restored?
Access is typically restored after making a payment in response to the ransomware demand.
What is the purpose of authentication, and how is it defined ?
The purpose of authentication is to validate that users are the rightful owners of the stated identity. Authentication is defined as the process of verifying or proving the user’s identification.
Name the three common methods of authentication mentioned in the text.
The three common methods of authentication are:
Something you know: Passwords or passphrases
Something you have: Tokens, memory cards, smart cards
Something you are: Biometrics, measurable characteristics
Explain the concept of “Something you know” in the context of authentication.
“Something you know” refers to authentication using passwords or passphrases. Users prove their identity by providing knowledge that only the rightful owner of the identity should possess.
Provide examples of “Something you have” in the authentication process.
Examples of “Something you have” include tokens, memory cards, and smart cards. These physical items contribute to the authentication process.
Define “Something you are” and provide an example mentioned in the text.
“Something you are” refers to authentication using biometrics, measurable characteristics. An example mentioned in the text could be fingerprint or facial recognition.
Why is it important to validate the identity of the requestor during authentication?
It is important to ensure that the requestor is the rightful owner of the stated identity, and validating this identity during authentication helps achieve that goal.
How does authentication contribute to the overall security of systems?
Authentication contributes to overall security by preventing unauthorized access. It ensures that only individuals with the rightful ownership of the identity can gain access to systems.