D1: Information Security Governance and Risk Management Flashcards
Integrity
Accuracy and reliability of the information and systems are provided and any unauthorized modification is prevented
Availability
Reliable and timely access to data and resources is provided to authorized individuals
Confidentiality
Necessary level of secrecy is enforced and unauthorized disclosure is prevented
List some controls for Availability
- redundent array of inexpenisve disks (RAID)
- clustering
- load balancing
- redundant data and pwoer lines
- software and data backups
- disk shadowing
- co-locatio nand off-site facilities
- roll-back functions
- fail-over configurations
Name some controls for Integrity
- hashing (data integrity)
- configuration management (system integrity)
- Change control (process integrity)
- access control (physical and technical integrity)
- software digital signing
- transmission CRC functions
Name some controls for confidentiality
- encryption for data at rest (whole disk, database encryption)
- encryption for data in transit (IPSec, SSL, PPTP, SSH)
- access controls (physical and technical)
VULNERABILITY
Weakness or a lack of a countermeasure
i.e.: service running on a server; unpatched application or OS; unrestricted wireless access point; open port on firewall; lax physical security; unenforced password mgt. on severs/workstations
THREAT AGENT
Entity that can exploit a vulnerability
(i.e.: intruder acessing the network through a port on the FW; a process accessing data in a way that violates the security policy; a tornado wiping out a facility; employee making unintentional mistake)
THREAT
The danger of a threat agent explotiing a vulnerability
(ssomeon or somethign will identify a specific vulnerability and use it against the company/individual.
RISK
the probability of a threat agent exploiting a vulnerability and the associated impact.
(if FW has several ports open, higher likelilihood intruder will access; if uesrs not educated on processes/procedures there sa higher likelihood that an employee will destory data; IDS not implemented higher likelihood attack will go unnoticed
CONTROL
Safeguard that is put in place to reduce a risk; also called a countermeasure
EXPOSURE
Presence of a vulneraiblity which exposes the organization to a threat
(i.ee.: if PW mgt is lax, compony is exposed; does not have its wiring inspective; exposed to devastating fires)
CONTROL
Countermeasure taht is put into place to mitigate (reduce) the potential risk
What are the three main types of controls?
1 - Administrative Controls (soft controls)
2 - Technical Controls (aka logical controls)
3 - Physical Controls
Describe administrative controls
Management oriented: i.e. security documentation; risk management; personnel security; training
Describe technical controls
software/hardware components (i.e. FWs IDS, encryption, identification and authenticatin mechanisms)
Describe physical controls
items put into place to protect facility, personnel, resources (i.e. security guards, locks, fencing)
Name the different functionalities of the security controls
1-prventative 2- detective 3- corrective 4- deterrent 5-recovery 6-compensating
DETERRENT CONTROL
Intended to discourage a potential attacker
PREVENTATIVE
Intended to avoid an incident from occurring
CORRECTIVE CONTROL
Fixes components or systems after an incident has occurred
RECOVERY CONTROL
Intended to bring the environment back to regular operations
DETECTIVE CONTROL
Helps identify an inciden’ts activities and potentially an intruder
COMPENSATING CONTROL
Controls that provide an alternative measure of control
What you can’t ____, you should be able to ___, and if you ____ something, it means you weren’t able to _____ it, and therefore you should take _____ ___ to make sure it is indeed ___ the next time around.
prevent; detect; detect; prevent; corrective action; prevented
Examples of Preventive Administrative Controls
- policies and procedures
- effective hiring practices
- pre-employment background checks
- cotnrolled termination processes
- data classification and labeling
- security awareness
Examples of Preventitive Physical controls
Badges, swipe cards
Guards, dogs
Fences, locks, mantraps
What is the bS7799 and its significance?
British Standard 7799, developed in 1995 by UK gvt. to outline how an information security management system (ISMS; aka security program) should be build and maintained. Was the basis of the ISO/IEC 2700 series
ISO
International Organization for Standardization
IEC
International Electrotechnical Commission
The objectives of security are to provide
Avilability, integrity, and confidentiality protection to data and resources
CoBIT
a framework of control objectives and allows for IT governence
ISO/IEC 27001
The standard for the establishment, implementation, control, and improvement of the information security management system