Cit Flashcards
What is Information Security?
It is the protecting of information and information systems from unauthorized access, use etc.
What is information assets?
Data that one deems valuable.
It can be either physical or digital.
Examples of information assets.
Paper documents
Digital documents
Password
Software
Source
Etc
What is our most important assets?
People
What should we consider when securing an asset?
We must consider how the level of security relates to the value of the asset.
Example
If it is very valuable it should have high security.
Vice versa
What are the 3 types of security controls?
Prevention
Detection
Recovery
What is prevention in security controls?
They try to prevent an incident from happening.
What is detection in security controls?
They try to detect incidents after they have happened.
What is recovery in security controls?
They try to reverse the impact of an incident.
What is the CIA Triad?
Confidentiality
Availability
Integrity
What is confidentiality in the CIA?
This means information should only be accessible to those who are authorized to access it.
What is Integrity in the CIA Triad?
It means information should not be tampered with by unauthorized people.
What is Availability in the CIA Triad?
It is ensuring that data is accessible and usable when needed.
What is the Parkerian hexad?
It is an extension of the CIA Triad
It adds 3 more to the CIA.
What is possession in the Parkerian hexad?
It refers to the physical arrangement of media which the data is stored on.
What is authenticity in the Parkerian hexad?
It is about verifying the origin and legitimacy of the data.
It ensures that the data comes from a reliable source.
What is utility in the Parkerian hexad?
It is how useful and relevant the data is.
It should server its purpose.
What is an attack?
An attack is a security threat that involves an attempt to obtain, change, destroy, implant or reveal info with out permission.
What are the 4 types of attacks?
Interception
Interruption
Modification
Fabrication
What is interception?
It allow unauthorized users to access data and applications.
Attack against confidentiality.
What are some examples of interception attacks?
Eavesdropping
Wiretapping
Key logging
What is interruption?
It is when a network service (data) is made unavailable.
Attacks against Availability.
What are some examples of interruption?
Ransomware
DDos/overloading
Cutting a communication line.
What is modification?
It is an attack against the integrity of the information.
What are the 3 types of modification?
Change: change existing information.
Insertion: Adding information that was not originally there.
Deletion:
Removal of existing information.
What are some examples of modification?
Data tampering
Changing the contents of a message.
Altering programs actions.
What is fabrication?
It is the creation of fake data, identifies, information with the intent to gain unauthorized access.
Attack on integrity and availability
What is spoofing?
Fake email trying to pretend it is real.
What is an information security threat?
Any thing that can harm the CIA of business’s information.
What are the 3 types of information security threats.
Abusers and Misusers
Accidental occurrences
Natural Physical Forces