Exam Flashcards
ISO27000 INFORMATION SECurity
Preservation of confidentiality, integrity and availability of information
What determines a good hash function?
Fast
Not possible to revert
No collisions
3 stages of security control
Storage, transmission and processing
Application of hash functions
MAC
Check if a download is correct (no byte tampering)
Storing information such as password (compare the hashes to eachother)
What does TLS achieve?
Encryption, authentication
PORT for HTTPS and HTTP?
HTTPS: 443
HTTP: 80
Confidentiality
The property that information is not made available or
disclosed to unauthorized individuals, entities, or
processes
Availability
The property of being accessible and usable
upon demand by an authorized entity.
Integrity
The property of accuracy and completeness
ISO27001
Information Security Management System
It describes a framework setting up and managing an ISMS,
i.e. establishing and operating a security program within an organisation
ISO27005
risk management process
ISO27002
Code of practice for information security management
It provides a checklist of security controls that organisations
can consider using and implementing.
Risk treatment strategies
– Reduce,
share,
retain/accept,
avoid
Authorization
Authorization is to specify access and usage permissions for entities, roles or
processes
biometric requierment
Universality:
Each person should have the characteristic;
Distinctiveness:
Any two persons should be sufficiently different in
terms of the characteristic;
Permanence:
The characteristic should be sufficiently invariant
(with respect to the matching criterion) over a period
of time;
Collectability: