Class three Flashcards
Identify
First step of security framework, identification of your valuable assets - consider all locations in digital landscape, all potential vectors of attack, inherent value of each location. Not necessarily within a network perimeter due to mobile, cloud, and supplier systems.
Protect
Second step of security framework, protect with appropriate security using various control types. Categories of control: physical, technical, procedural, legal.
Detect
Third step of security framework, detect compromised accounts and devices
Respond
Fourth step of security framework, quarantine the problem and identify countermeasures
Recover
Last step of security framework, replace, restore, or otherwise fix compromised assets
Cyber defense points
Determine where important info is located and where it passes through. Data, devices, applications, systems, networks, communication channels.
Control types
Physical, procedural, technical, and legal security controls.
Control modes
proactive/preventative, reactive/detective, corrective cyber defenses.
Information classification
assignment of one or more values to a collection of knowledge to help us understand how alike it is to other sets of knowledge and know the comparative security requirements and priority. CIA for infosec. Sometimes also consent for info on private individuals.
consent
Legal considerations are involved in how personal electronic information can be used and where it can be viewed, stored, transmitted, or otherwise processed. As such, permission is required to specify what info can be collected, where processed, how long retained.
Confidentiality
assignment of a value to a set of info to indicate level of secrecy and access restrictions required to prevent unauthorized people from viewing it.
Integrity
value assigned to a set of information to indicate how sensitive it is to degradation of accuracy or data loss (loss of access, not theft). Typically how often to back it up or if it needs a permanent failover system.
Availability
value assigned to a set of information to indicate how much disruption or outage the owner considers acceptable. Often a time scale. If needs to always be available, redundant failsafe.
Data as defense point
info in digital or electronic format, some security controls can be applied directly to this.
Devices as defense point
hardware used to create, modify, process, store, or transmit data: computers, smartphones, USB.