Chapter 10 - Test 3 Flashcards
What is the first step in any security plan?
- risk assessment
- understanding the key assets that need protection, and assessing the risks to each.
What is network security focused on?
-preventing, detecting, and correcting security problems due to disruptions, destruction, disaster, and unauthorized access.
What is the primary goal of network security?
-protect organizations’ data and application software.
What are the fiver primary goals of network security?
- confidentiality
- integrity
- availability
- non-repudiation
- authentication
Describe confidentiality.
-the protection of organizational data from unauthorized disclosure of customer and proprietary data.
Describe Integrity.
-assurance that data have not been altered or destroyed.
Describe availability.
-providing continuous opertion of the organization’s hardware and software so that staff, customers, and suppliers can be assured of no interruptions in service.
Describe non-repudiation.
-a person can’t deny having performed an action.
Describe authentication.
-authenticate identity, give access to resources they only have access to, audit use of those resources.
What categories can security threats be classified as?
- ensuring business continuity
- preventing unauthorized access.
Describe business continuity.
-ensuring availability with some aspects of data integrity.
Describe business continuity.
-ensuring availability with some aspects of data integrity.
What are the three main threats to business continuity?
- disruptions: loss of or reduction in network service.
- destruction of data
- intrusion: confidentiality and integrity.
Describe controls.
-software, hardware, rules, or procedures that reduce or eliminate the threats to network security.
What do controls do?
-prevent, detect, and/or correct whatever might happen to the organization because of threats facing its computer-based systems.
What do controls do?
-prevent, detect, and/or correct whatever might happen to the organization because of threats facing its computer-based systems.
Describe preventive controls.
- mitigate or stop a person from acting or an event from occuring.
- examples are passwords, guard, or security lock
Describe detective controls.
- reveal or discover unwanted events.
- software that looks for illegal network entry
Describe corrective controls.
-remedy an unwanted event or an intrusion.
Describe a risk assessment.
-assign levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.
Describe a control spreadsheet.
-ensures that data communication networks and microcomputer workstations have the necessary controls and that these controls offer adequate protection. that are currently in the network.
What is the first step in a risk assessment
- identify assets.
- something of value and can be either hardware, software, data, or applications.
Describe mission-critical applications.
- an information system that is critical to the survival of the organization.
- cannot be permitted to fail, and if it does fail, the network staff drops everything else to fix it.
Describe threats.
-potential adverse occurence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization.