Chapter 1 - Security Governance Through Principles and Policies Flashcards

1
Q

three common types of security evaluation

A

risk assessment, vulnerability assessment, and penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk assessment

A

is a process of identifying assets, threats, and vulnerabilities, and then using that information to calculate risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerability assessment

A

uses automated tools to locate known security weaknesses, which can be addressed by adding in more defenses or adjusting the existing protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Penetration testing

A

uses trusted individuals to stress-test the security infrastructure to find issues that may not be discovered by the prior two means, with the goal of finding those concerns before an adversary takes advantage of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

primary goals and objectives of a security infrastructure

A

Confidentiality, integrity, and availability (CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality

A

is the concept of the measures used to ensure the protection of the secrecy of data, objects, or resources. The goal of is to prevent or minimize unauthorized access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

countermeasures that can help ensure confidentiality?

A

encryption, network traffic padding, strict access control, rigorous authentication procedures, data classification, and extensive personnel training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sensitivity

A

Sensitivity refers to the quality of information, which could cause harm or damage if disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Discretion

A

Discretion is an act of decision where an operator can influence or control disclosure in order to minimize harm or damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Criticality

A

The level to which information is mission critical is its measure of criticality. The higher the level of criticality, the more likely the need to maintain the confidentiality of the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Concealment

A

Concealment is the act of hiding or preventing disclosure. Often concealment is viewed as a means of cover, obfuscation, or distraction. A related concept to concealment is security through obscurity, which is the concept of attempting to gain protection through hiding, silence, or secrecy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secrecy

A

Secrecy is the act of keeping something a secret or preventing the disclosure of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privacy

A

Privacy refers to keeping information confidential that is personally identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Seclusion

A

Seclusion involves storing something in an out-of-the-way location, likely with strict access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Isolation

A

Isolation is the act of keeping something separated from others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integrity

A

is the concept of protecting the reliability and correctness of data. Prevents unauthorized alterations of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Integrity can be examined from three perspectives

A
  • Preventing unauthorized subjects from making modifications
  • Preventing authorized subjects from making unauthorized modifications, such as mistakes
  • Maintaining the internal and external consistency of objects so that their data is a correct and true reflection of the real world and any relationship with any other object is valid, consistent, and verifiable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Numerous attacks focus on the violation of integrity.

A

viruses, logic bombs, unauthorized access, errors in coding and applications, malicious modification, intentional replacement, and system backdoors

19
Q

Numerous countermeasures can ensure integrity against possible threats

A

strict access control, rigorous authentication procedures, intrusion detection systems, object/data encryption, hash verifications, interface restrictions, input/function checks, and extensive personnel training.

20
Q

Accuracy

A

Being correct and precise

21
Q

Truthfulness

A

Being a true reflection of reality

22
Q

Validity

A

Being factually or logically sound

23
Q

Accountability

A

Being responsible or obligated for actions and results

24
Q

Responsibility

A

Being in charge or having control over something or someone

25
Q

Completeness

A

Having all necessary components or parts

26
Q

Comprehensiveness

A

Being complete in scope; the full inclusion of all needed elements

27
Q

Availability

A

means authorized subjects are granted timely and uninterrupted access to objects. Often, controls support sufficient bandwidth and timeliness of processing as deemed necessary by the organization or situation

28
Q

ways to maintain availability on a system

A
  • ensure authorized access and an acceptable level of performance
  • to quickly handle interruptions
  • provide for redundancy
  • maintain reliable backups
  • prevent data loss or destruction.
29
Q

Numerous countermeasures can ensure availability against possible threats

A
  • designing intermediary delivery systems properly
  • using access controls effectively
  • monitoring performance and network traffic
  • using firewalls and routers to prevent DoS attacks
  • implementing redundancy for critical systems
  • maintaining and testing backup systems

Business continuity planning (BCP), focus on the use of fault tolerance features at the various levels of access/storage/security (that is, disk, server, or site) with the goal of eliminating single points of failure to maintain availability of critical systems.

30
Q

Usability

A

The state of being easy to use or learn or being able to be understood and controlled by a subject

31
Q

Accessibility

A

The assurance that the widest range of subjects can interact with a resource regardless of their capabilities or limitations

32
Q

Timeliness

A

Being prompt, on time, within a reasonable time frame, or providing low-latency response

33
Q

DAD Triad

A

Disclosure, alteration, and destruction. DAD Triad represents the failures of security protections in the CIA Triad

34
Q

Authenticity

A

is the security concept that data is authentic or genuine and originates from its alleged source. This is related to integrity, but it’s more closely related to verifying that it is from a claimed origin

35
Q

Nonrepudiation

A

ensures that the subject of an activity or who caused an event cannot deny that the event occurred. can be established using digital certificates, session identifiers, transaction logs, and numerous other transactional and access control mechanisms

36
Q

AAA services

A

is a core security mechanism of all security environments. The three As in this abbreviation refer to authentication, authorization, and accounting (or sometimes auditing)

37
Q

five elements of AAA services

A
  • identification
  • authentication
  • authorization
  • auditing
  • accounting
38
Q

Identification

A

is claiming to be an identity when attempting to access a secured area or system. . Providing an identity can involve typing in a username; swiping a smartcard; waving a proximity device; speaking a phrase; or positioning your face, hand, or finger for a camera or scanning device. Without an identity, a system has no way to correlate an authentication factor with the subject.

39
Q

Authentication

A

is proving that you are that claimed identity. Authentication requires the subject to provide additional information that corresponds to the identity they are claiming. The most common form of authentication is using a password

40
Q

Authorization

A

is defining the permissions (i.e., allow/grant and/or deny) of a resource and object access for a specific identity or subject. The process of authorization ensures that the requested activity or access to an object is possible given the rights and privileges assigned to the authenticated identity. In most cases, the system evaluates the subject, the object, and the assigned permissions related to the intended activity.

41
Q

Auditing

A

is recording a log of the events and activities related to the system and subjects. Auditing is recording activities of a subject and its objects as well as recording the activities of application and system functions. Log files provide an audit trail for re-creating the history of an event, intrusion, or system failure. Auditing is needed to detect malicious actions by subjects, attempted intrusions, and system failures and to reconstruct events, provide evidence for prosecution, and produce problem reports and analysis

42
Q

Accounting

A

is reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions, especially violations of organizational security policy. Accountability is established by linking an individual to the activities of an online identity through the security services and mechanisms of auditing, authorization, authentication, and identification. Thus, individual accountability is ultimately dependent on the strength of these processes

43
Q

Monitoring vs Auditing

A

Monitoring is part of what is needed for audits, and audit logs are part of a monitoring system, but the two terms have different meanings. Monitoring is a type of watching or oversight, whereas auditing is a recording of the information into a record or file. It is possible to monitor without auditing, but you can’t audit without some form of monitoring.