Chapter 1: What is Information Security? Flashcards
protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
Information Security
our ability to protect our data from those who are not authorized to view it.
Confidentiality
can be compromised by the loss of a laptop containing data, a person looking over our shoulder while we type a password, and email attachment being sent to the wrong person and the like
Confidentiality
the ability to prevent our data from being changed in an unauthorized or undesirable manner.
Integrity
can be compromised by the unauthorized change or deletion of our data or portions of our data etc.
Integrity
refers to the ability to access our data when we need it.
Availability
A more complex system for the CIA triad
Parkerian Hexad
refers to the physical disposition of the media on which the data is stored.
Possession or Control
enables without involving other factors such as availability to discuss our loss of the data in its physical medium
Possession or Control
allow us to talk about the proper attribution as to the owner or creator of the data in question.
Authenticity
reverse concept to authenticity
Nonrepudiation
refers to how useful the data is to us
Utility
attacks that allow unauthorized users to access our data, applications, or environments.
Interception
attack against confidentiality
Interception
attacks cause our assets to become unusable or unavailable for our use, on a temporary or permanent basis.
Interruption
can often affect availability but can be attack on integrity as well
Interruption
involves tampering with our asset
Modification
often seen as an attack on integrity but also could be an attack on availability
Modification
involves generating data, processes, communications, or other similar activities with a system
Fabrication
often attacks integrity but could be considered an attack on availability
Fabrication
when the value of the asset being threatened is considered to be a factor
Impact
controls that protect the physical environment
Physical Controls
protects the system, networks and environment
Logical and Technical controls
based on rules, laws, policies, procedures etc.
Administrative Controls
Confidentiality is affected by __
interception
Integrity is affected by __
Interruption, Modification and fabrication
availability is affected by __
Interruption, modification and fabrication
One of the first and maybe the most important part of the risk management process
Identify Assets
step after our assets are pointed out
Identify threats
used in conjunction with the knowledge of potential threats
assess vulnerability
found by using the knowledge of the threats and vulnerability
assess risk
the use of controls to account for threats
mitigating risk
the reaction to when risk management fails
Incident Response
done in advance of an incident
Preparation
where the action takes place in the incident response
Detection and analysis
where most of the work to solve the incident takes place
containment, eradication, and recovery
determine what happened, and what we can do to fix
Post Incident Activity