Chapter 1 - Security Governance Through Principles and Policies Flashcards
What does CIA stand for?
Confidentiality, Integrity and Availability
What does DAD stand for?
Disclosure, alteration, and destruction
Concepts to assess confidentiality
Sensitivity,
Discretion,
criticality,
concealment,
secrecy,
privacy,
seclusion,
isolation
Sensitivity
Quality of information, which could cause harm or damage if disclosed
Discretion
Act of decision where an operator can influence or control disclosure in order to minimize harm or damage
Criticality
Level of which information is missin critical is its measure of criticality. The. higher the level the more likly to maintain higher confidentiality
Concealment
Act of hiding or preventing disclosure
Secrecy
Acto of keeping something a secret or preventing the disclosure of information
Privacy
Refers to keeping information confidential
Seclusion
Involves storing in an out of the way location
Isolation
Act of keeping something separated from others
Integrity
Dependent on confidentiality and access control - Concepts include Accuracy, Truthfulness, Validity, Accountability, Responsibility, Completeness, Comprehensiveness
AAA Services
Identification, Authentication, Authorization, Auditing, Accounting
Defense in Depth
Also known as LAYERING. Is the use of multiple controls in a series. No one control can protects against all possible threats.
Abstraction
Used for efficiency. Similar elements are put into groups, classes, or roles.
Data Hiding
Preventing data from being discovered by positioning in a logical storage compartment that is not accessible or seen
Security through obscurity
Idea of not informing a subject about an object being present and hoping will not be discovered
Security governance
Collection of practices related to supporting, evaluating, defining, and directing the security efforts of an organization
Who is responsible for security governance?
Board of directors, CEO, CISO.
ATO
Authorization to operate. Failing to provide sufficient documentation to meet requirements of third party governance can result in loss of ATO.
Security Management Planning
Ensures creation, implementation and enforcement of a security policy. Aligns security functions to the strategy, goals, mission, and objectives of the organization.
COBIT 5 Principles
Created by ISACA, COBIT allows practitioners to govern and manage IT
framework help organizations optimize their IT management and governance processes by meeting contractual agreements and complying with the latest regulatory and legal requirements.
-meeting stakeholder needs,
-covering the enterprise end-to-end,
-applying a single integrated framework,
-enabling a holistic approach,
-and separating governance from management
AUP
Acceptable Use Policy defines what is and what is not acceptable activity practice or use of company equipment and resources.
Collusion
When several people work together to perpetrate a crime