Encryption Flashcards
What are the 5 steps in Risk Assessment
1) Assets
2) Vulnerability
3) Threat
4) Adversary
5) Consequence
What is the best way to tailor security controls
Tailor controls specific to your assets to minimise the burdens
What is the 3 word acronym for security parameters
C - Confidentiality
I - Integrity
A - Availabilty
What is the extended acronym for security parameters
CIA
P - Possession
A - Authenticity
N - Non-repudiation
A - Authorisation
Define Confidentiality
when we want an asset to remain undisclosed
Define Integrity
Ensuring the accuracy and completion of an asset
Define Availability
The asset must be available and functioning when we need it e.g. not destroyed or encrypted
Define Possession
Ensuring that the asset remains in the right hands and not stolen
Define Authenticity
Validity of claim of origin or authorship
Define Non-Repudiation
Ensures that neither the sender or receiver can deny fulfillment of either end of a contract
What are the 3 main types of protection
Prevention
Detection
Recovery
Define Prevention
Preventing files from being compromised e.g. encryption or keeping keys hidden
Define Detection
Being able to detect an attacker e.g. using deliberate traps, canary tokens and other notification triggers
Define Recovery
Having the ability to recover what is lost
What is the Zero Trust Model
Everything done involves a factor of risk. Evaluate and Distribute the trust