Gary's Flashcards
Security Model
Formal description of Security Policy. Abstraction
Security Model ensures:
Confidentiality. Integrity. Availability. Non-Repudation. Authenticity.
Static Security Model
Treasure kept safe with defence, encrypted. Guard protects entrance for owner to access, keeps out foe Layered Defense method.
Information Passing Security Model Description+Threat:
When info is transferred and processed resulting in an action. Threat: Hacker being able to manipulate information to influence action to perform.
Information Passing Security Model Components:
- Information.
- Communication
- Processing
- Action
Information Passing Security Model Potential attacks:
- Original data manipulated
- Data manipulated in transit
- Disruption of communication
- Interference with Processing
- Nullification of Action
Security Administration. Contains:
- Planning
- Risk Analysis
- Policy
- Physical Control
Planning :Contains
- Security Plan
- Incident Response Plan
- Business Continuity Plan
Planning. Purpose:
- Stop & Contain: Events quickly dealt with. Categorise and classify incidents.
- Eradicate: Minimise effects of incident.
- Report: Assess and deal with security vulnerabilities.
- Follow-up: Learn lessons, review Action plan.
Security Plan: Aim
- Stop and contain the incident
- eradicate the effects of the incident
- Review what went wrong and how the incident happened
- Follow up by changing the security plan
Security Plan contains
- Requirements: Check they are: Correct, Consistent, Complete, Realistic, Need, Verifiable, Traceable.
- Constraints: Budget, schedule, performance, regulations.
- Reccomendations for implementations
- Accountability: Who is accountable for each req?
- Timetable
- Update Policy - to dictate when to be updated
Incident Response Plan defines
- What an incident is
- Assign a person to handle it
- Describe plan of action
Incident Response Plan. Contents:
- Advance Planning - Everybody trained and know what to do.
- Triage - First assessment of damage
- Managing Incident. Who is in the team. What actions to do - Preserve evidence, react legally, record.
- Review - What went wrong? Did the security plan work as planned?
Business Continuity Plan
Documents used by a company to continue to function during a computer security incident. Used to help how to cope during the incident.
Business Continuity Plan. Must:
- Assess Impact to Business
- develop strategy to deal with the problems