Chapter 1- Security Governance Through Principles and Policies Flashcards
5 Pillars of Information Security
Confidentiality
Integrity
Availability
Authenticity
Nonrepudiation
DAD Triad
Disclosure
Alteration
Destruction
Authenticity
Data is genuine and originates from its alleged source
Nonrepudiation
Ensures that the subject of an activity or who caused an event cannot deny that the event occurred.
Prevents subjects from claiming not to have sent a message, performed an action, been the cause of an event, etc
Enforced through digital certificates, session identifiers, transaction logs, etc
AAA Services
Identification
Authentication
Authorization
Auditing
Accounting
Authentication
Proving that you are a claimed identity
Authorization
Defines permissions of a resource and object access for a specific identity
Accounting
Reviewing log files to check for compliance and violations to hold subjects accountable
Abstraction
Similar elements put into groups, classes, or roles that are collectively assigned security controls, restrictions, or permissions
Data Hiding
Intentionally positioning data so that it is not viewable or accessible to an unauthorized subject
Security Boundary
Line of intersection between areas, subnets, or environments with different security requirements or needs
Security Governance
Collection of practices related to supporting, evaluating, defining, and directing an organization’s security efforts
Seeks to compare organization’s security processes and infrastructure with knowledge and insight from external sources
Security Function
Aspect of operating a business that focuses on evaluating and improving security over time
Strategic Plan
Long term, defines organization’s security purpose and aligns it with goals, mission, and objectives of the organization. 5+ years
Tactical Plan
Mid term plan developed to provide more details on accomplishing the goals set in the strategic plan, but can also be ad hoc based on unpredicted events. Approximately 1 year
Organizational Plan
Short term, highly detailed plan based on strategic and tactical plans. Useful only for a short time, must be updated often to align with tactical plans
Senior Manager
Ultimately responsible for security maintained by the organization. Signs off on all security policy issues. Decision makers.
Security Professional
Writes and implements security policy. Implementers.
Asset Owner
Responsible for classifying information for placement/protection within the security solution. Typically a high-level manager but delegates data management tasks to custodian
Custodian
Responsible for the tasks of implementing the prescribed protection defined by policy and senior management