Chapter 1 - Security Governance Through Principles and Policies Flashcards
three common types of security evaluation
risk assessment, vulnerability assessment, and penetration testing
Risk assessment
is a process of identifying assets, threats, and vulnerabilities, and then using that information to calculate risk
Vulnerability assessment
uses automated tools to locate known security weaknesses, which can be addressed by adding in more defenses or adjusting the existing protections
Penetration testing
uses trusted individuals to stress-test the security infrastructure to find issues that may not be discovered by the prior two means, with the goal of finding those concerns before an adversary takes advantage of them
primary goals and objectives of a security infrastructure
Confidentiality, integrity, and availability (CIA)
Confidentiality
is the concept of the measures used to ensure the protection of the secrecy of data, objects, or resources. The goal of is to prevent or minimize unauthorized access to data
countermeasures that can help ensure confidentiality?
encryption, network traffic padding, strict access control, rigorous authentication procedures, data classification, and extensive personnel training
Sensitivity
Sensitivity refers to the quality of information, which could cause harm or damage if disclosed
Discretion
Discretion is an act of decision where an operator can influence or control disclosure in order to minimize harm or damage.
Criticality
The level to which information is mission critical is its measure of criticality. The higher the level of criticality, the more likely the need to maintain the confidentiality of the information.
Concealment
Concealment is the act of hiding or preventing disclosure. Often concealment is viewed as a means of cover, obfuscation, or distraction. A related concept to concealment is security through obscurity, which is the concept of attempting to gain protection through hiding, silence, or secrecy.
Secrecy
Secrecy is the act of keeping something a secret or preventing the disclosure of information.
Privacy
Privacy refers to keeping information confidential that is personally identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed.
Seclusion
Seclusion involves storing something in an out-of-the-way location, likely with strict access controls.
Isolation
Isolation is the act of keeping something separated from others.
Integrity
is the concept of protecting the reliability and correctness of data. Prevents unauthorized alterations of data.
Integrity can be examined from three perspectives
- Preventing unauthorized subjects from making modifications
- Preventing authorized subjects from making unauthorized modifications, such as mistakes
- Maintaining the internal and external consistency of objects so that their data is a correct and true reflection of the real world and any relationship with any other object is valid, consistent, and verifiable