Domain 1: Security and Risk Management Flashcards
CIA Triad
Confidentiality: prevent the unauthorized disclosure of information.
Integrity: prevent unauthorized modification of information; keep accurate
Availability: ensures that the information is available when needed
Identity
Subjects
Objects
Subjects: an active entity on an information system. (Doing something)
Object: a passive data file. (What is being accessed.)
Risks
Annualized Loss Expectancy (ALE)
Safeguard (Control)
Total Cost of Ownership (TCO)
Return on Investment (ROI)
Risk: the likelihood of something bad happening and the impact if it did; threats (source) and vulnerabilities (weakness)
Annualized Loss Expectancy (ALE): the cost of loss due to a risk over a year
Safeguard (Control): a measure taken to reduce risk
Total Cost of Ownership (TCO): total cost of a safeguard/control
Return on Investment (RIO): money saved by deploying a safeguard.
Information Security
Information security is managing the risks to the confidentiality, integrity, and availability of information using administrative and, physical and technical controls.
Opposite of CIA
Disclosure
Alteration
Destruction
Confidentiality
.Prevent unauthorized access; disclosure, or read access
.Keeping data secret
.Data accessible to subjects with clearance, formal approval, and need to know.
Integrity
Prevent unauthorized modification or write access.
Data integrity:
System integrity:
Availability
Ensure that data is available when needed
Risk Management
In order to determine risk, we must first determine what our most important (or critical assets) are
We use safeguards (or controls) to protect our assets and mitigate (not eliminate) risk.
Risk tolerance: the amount of risk that the business is willing to tolerate (or accept).
Privacy
Managing the risk to confidentiality, integrity and availability of personally identifiable information (PII) using administrative, technical and physical controls.
Privacy is not concerned with integrity and availability.
Identity
A claim to be someone or something
Authentication
Proof that I am who I say I am.
A subject proves identity to another subjects or object
3 types
.Something you know: Password, PIN
.Something you have: token, phone debit card
Something you are: biometrics
Strong multi-factor authentication: Using a combination of 2 or more factors
Authorization
What actions are are a subject permitted to perform?
Read, write execute
Privileges, rights, permissions
Rule 802
Hearsay Rule: second hand information is normally inadmissible in court.
There are exceptions
Evidence integrity
Integrity of evidence in a critical forensic function
Checksum: can ensure that no data changes occurred as a result of the acquisition and analysis
One-way hash functions are used for this purpose.