Cyber Security Flashcards
What is Information Security?
Information security is the preservation of confidentiality, integrity and availability of information.
- Confidentiality:
- The property that information is not disclosed to unauthorised individuals, entities or processes
- Integrity:
- The property of safeguarding the accuracy and completeness of assets
- Availability:
- The property of being accessible and usable upon demand by an authorised entity
Asset
Anything that has value to the organisation, its business operations and its continuity
Threat
A potential cause of an incident that may result in harm to a system or organisation
Vulnerability
A weakness of an asset or group of assets that can be exploited by one or more threats
Impact
The result of an information security incident, caused by a threat, which affects assets
Risk
The potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organisation
Information Security definitions and terminology:
. Preservation of confidentiality, integrity and availability of information.
* Assets; Threats; Vulnerabilities; Impacts; Risks.
Information System assets:
- Primary assets: Business processes & activities; Information.
- Supporting assets: Hardware; Software; Network; Personnel; Site; Organisation’s structure.
Information Security Governance
Information Security Governance refers to the framework, policies, procedures, and processes that an organization implements to manage and oversee its information security efforts effectively. It involves establishing structures and mechanisms to ensure that information assets are protected in line with the organization’s goals, objectives, and risk tolerance.
- How organisations control, direct communicate their cybersecurity risk management activities
- Policies, Standards, Guidelines and Procedures
- Security, Education, Training and Awareness (SETA)
- Incident Response
Assets
- Primary assets:
* Business processes & activities
* Information - Supporting assets
(on which the primary assets rely)- Hardware
- Software
- Network
- Personnel
- Site
- Organization’s structure
Each component has its own strengths and weaknesses, and each has its own security requirements
Information
- Business critical information for the exercise of the organisation’s mission
- Personal information, as can be defined specifically in the sense of the national laws regarding privacy
- Strategic information required for achieving objectives determined by the strategic orientations
- High-cost information whose gathering, storage, processing and transmission require a long time and/or involve a high acquisition cost
Business Processes
- Processes that contain secret processes or processes involving proprietary technology
- Processes that, if modified, can greatly affect the accomplishment of the organisation’s mission
- Processes that are necessary for the organisation to comply with contractual, legal or regulatory requirements
- Business processes/procedures (i.e., documented instructions to accomplish a certain task) are often overlooked
- They are information assets in their own right
Hardware
- This is the physical technology that
* houses and executes the software
* stores and carries the data
* provides the interface for data
entry/removal from the system - Traditional physical security like locks and keys restrict access to and the interaction with the hardware components
- Securing the physical location of the hardware is important as physical access may mean info can be extracted
Software
- The software component of IS comprises
* applications
* operating systems
* assorted command utilities - It’s arguably the most difficult IS component to secure
- Unfortunately, software development is often under resourced
- As such, information security is usually only added as an afterthought rather than being embedded as an integral part
- The exploitation of software errors in software programming accounts for a substantial proportion of attacks on information
Networks
Component that increased need for information security; challenges emerge as information systems are increasingly interconnected
- Manage the network perimeter
* Use firewalls
* Prevent malicious content - Protect the internal network
* Segregate network
* Secure wireless access
* Enable secure administration
* Configure the exception handling processes
* Monitor the network
* Assurance processes
Personnel
Often overlooked in computer security considerations, but people make mistakes, fall victim of social engineering, may susceptible to
bribery/blackmail
- Produce a user security policy
- Establish a staff induction process
- Maintain user awareness of the security risks faced by the organisation
- Support the formal assessment of security skills
- Monitor the effectiveness of security training
- Promote an incident reporting culture
- Establish a formal disciplinary process
Policies, Standards, Guidelines and Procedures
- Policy A principle or rule to guide decisions and achieve rational outcomes
- Standards Detailed statements, quantifying what must be done to comply with policy
- Guideline A set of recommended actions to assist in complying with policy
- Procedure A list of steps that constitute instructions for performing some action or accomplishing some task
Disseminating Policies:
- Policies should be promoted/supported by a security education, training, and awareness (SETA) programme that helps employees do their jobs securely
- Education:
* Not everyone needs formal degree or
certificate in info security
* But some roles may require certain
employees to hold/attain info security
academic qualifications or industry certification - Training:
- EVERYONE in an organisation needs to be trained and aware
of information security - Provides employees with hands-on instruction and detailed
info designed to prepare them to perform duties securely - Management of info security can develop customised in-house
training or outsource training - Awareness:
- keeps info security at forefront of the user’s mind
- can be as simple as security posters, newsletters, flyers, etc
- may include printed mouse-pa