ENUMERATION Flashcards
PRELIM
PHASES IN THE SECURITY SYSTEMS DEVELOPMENT LIFE CYCLE
Initiation Phase
System Concept Development Phase
Design Phase
Development Phase
Implementation Phase
Operations and Maintenance Phase
Disposition Phase
THREATS THAT CAN COMPROMISE INFORMATION SECURITY
Cyberattacks
Data breaches
Physical security incidents
COMMON TYPES OF ATTACKS
Cyberattacks (hacking, malware, data breaches)
Insider Threats
Phishing
Ddos Attacks
Ransomware
Sql injection
Buffer overflow
EXAMPLES OF SECURITY CONTROLS
Administrative controls (Security Policies and Procedures)
Physical Controls (Access Control)
Technical Controls (encryption, firewall, intrusion detection systems, access control protocols)
Incident Report Controls (Incident Report Plans)
Compliance Controls (regulatory Compliance Measures, GDPR, HIPAA)
THE IMPORTANCE OF INFORMATION
Information is valuable therefore, Information Systems are valuable, and compromising Information Security Services (C-I-A) have real consequences (loss).
THE CIA TRIAD
Confidentiality
Integrity
Availability