Chapter 1 - Security Governance Through Principles and Policies Flashcards
Define Confidentiality
Protection of secrecy of the data/Prevention of unauthorized access to data.
Encryption would prevent a violation of which area of the CIA triad.
Confidentiality
Define Integrity
Protecting reliability and correctness of data/prevention of unauthorized alteration of data.
Intrusion detection systems and strict access control are countermeasures to ensure which area of the CIA triad?
Integrity
Availability
Timely and uninterrupted access to data/prevention of DDoS attacks.
Implementing redundancy, installing firewalls, and maintaining backup systems are countermeasures that ensure which are of the CIA triad?
Availability
In the DAD triad, what is the opposite of Confidentiality
A failure in confidentiality results in Disclosure
In the DAD triad, what is the opposite of Integrity
A failure in integrity results in Alteration
In the DAD triad, what is the opposite of Availability
A failure in availability results in Destruction
Authenticity
Users have a high level of confidence that data was sent from the alleged source without being manipulated in transit.
Non-Repudiation
Users are not able to take actions on the network without the action being attributed to them.
How many services are aligned to the AAA security mechanism?
5
Identification
The mechanism for presenting who the user is to the system (username, smart card, facial presentation).
Authentication
Proof that identity is accurate - password or pin.
Authorization
Defining permissions and assigning them to the user for resources.
Auditing
recording logs of events and activities related to system and subjects
Accounting
reviewing the log files to check for compliance and violations in order to hold users accountable for their actions.
The use of multiple controls in series is known as…?
Defense in Depth
Is defense-in-depth done in parallel or in series?
In series - if one layer of the defense fails, the system is uncompromised. If done in parallel, one failure could expose the whole system compromise.
Name other terms often used in relation to defense-in-depth besides layering.
Classifications, zones, realms, compartments, silos, segmentations, lattice structure, protection rings.
Abstraction
Used for efficiency - used when classifying objects or assigning roles.
Data Hiding
Users cannot see or access data in a higher classification than they are able to see
Encryption
Hiding the meaning of communication from unintended recipients.
What is the line of intersection between any two areas, subnets, or environments that have different security needs?
Security Boundary
The system of external entity oversight that may be mandated by law, regulation, industry standards, contractual obligations, or licensing requirements
Third-Party Governance
An example of auditing protocols that have a specific checklist of requirements to investigate:
COBIT - Control Objectives for Information and Related Technology
What is COBIT?
Control Objectives for Information and Related Technology - An example of auditing protocols that have a specific checklist of requirements to investigate.
If an organization fails to provide sufficient documentation to meet the requirements of third-party governance, what are the repercussions?
Loss or void of ATO - ATO cannot be reestablished without an on-site review showing full compliance.
What is a business case?
Documented need within the organization that conveys the purpose of the security approach.
Should security management planning be led by the IT staff in a bottom-up approach or from the management in a top-down approach?
Top-down approach.