Chapter 8: Security Flashcards
Concepts of Security
- security is a management issue
- the time based model of security
- Defense in Depth
Security as a management issue:
- create pro-active culture
- inventory information assets and resources
- implement mitigation
- monitor effectiveness
4 basica management activities called domains:
- Plan and Organize
- Acquire and Implement
- Deliver and Support
- Monitor and Evaluate
5 information systems controls that most directly pertain to systems reliability
- security
- confidentiality
- privacy
- process integrity
- Availability
Defense-in-depth
employ multiple layers of controls in order to avoid having a single point of failure PDC
Time-based model of security
employ a combination of detective and corrective controls that identify an information security incident early enough to prevent the loss or compromise of information.
Basic steps criminals use to attack an organizations Information system:
- Conduct reconnaissance
- Attempt Social Engineering
- Scan and Map the Target
- Research
- Execute the attack
- cover tracks
What happens during conducting reconnaissance
collecting information about the target. The objective is to learn as much as possible about the target and to identify potential vulnerabilities.
What happens during social engineering
use information obtained during reconnaissance to ‘trick’ an unsuspecting employee into granting them access - social engineering.
Preventive Controls
- Training
- user Access Controls (authenticate/authorize)
- Physical Access controls
- network access controls
- Device and software hardening controls
Detective Controls
- Log analysis
- Intrusion Detection Systems
- Security testing and audits
- managerial reports
Corrective Controls
- Computer Incident Response teams (CIRT)
- Chief Information Security Officer (CISO)
- Patch management
Passwords are a type of
Authentication
Authentication
the process of verifying the identity of a person or device attempting to access the system. The objective is to ensure that only legitimate suers can access the system. ACCESS
Types of Authentication
Smart card id badges
Biometrics
Secure ID systems
Combine into multi-factor authentication
Multifactor Authentication
use of two or all 3 types of authentications in conjunction
Multimodal Authentication
using multiple credentials of the same type.
Authorization
the process of restricting access of authenticated users to specific portions of the system and limit what actions they are permitted to perform. Restrict users functions and views.
Access Control Matrix
how authorization controls are often implemented. When an employee attempts to access a particular information systems resource, the system performance a compatibility test that matches the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action.