Domain 1 - Chapter 1 - Security Governance Through Principles & Policies Flashcards
What are the primary goals and objectives of a security infrastructure?
Confidentiality, integrity, and availability.
What is confidentiality?
Protection of the secrecy of data, objects, or resources.
What are the concepts, conditions, and aspects of confidentiality?
Sensitivity, discretion, criticality, concealment, secrecy, privacy, seclusion, & isolation.
What is integrity?
Protecting the reliability and correctness of data.
Prevents unauthorized alterations of data.
What is integrity is dependent on?
Confidentiality and access control
What are the concepts, conditions, and aspects of integrity?
Accuracy, truthfulness, validity, accountability, responsibility, completeness, & comprehensiveness.
What is availability?
Principles that authorized subjects are granted timely and uninterrupted access to objects.
What is availability is dependent on?
Integrity and confidentiality
What are the concepts, conditions, and aspects of availability?
Usability, accessibility, timeliness.
What is the opposite of the CIA Triad?
DAD
Disclosure, alteration, & destruction
DAD triad represents the failures of security protections in the CIA Triade.
Overprotecting confidentiality can result in?
Restriction of availability
Overprotecting integrity can result in?
Restriction of availability
Overproviding in availability can result in?
Loss of confidentiality and integrity
What is the core security mechanisms for all security environments?
IAAAA
Identification - Claiming to be an identity when attempting access to a secured area or system
Authentication - Proving that you are that claimed identity
Authorization - Defining permissions of a resource and object access
Auditing - Recording log events and activities related to systems and objects
Accounting - Reviewing log files to check for compliance and violations.
What are four types of protection mechanisms?
Defense in depth
Abstraction
Data Hiding
Encryption
What is security governance?
Collection of practices related to supporting, evaluating, defining, and directing the security elements of a organization.
Who is responsible for security management?
Upper Management