General Security Flashcards
What is information security (in general, not by ISO definition)
Information Security is the protection of information assets from damage or harm.
What are the assets to be protected?
Data files, software, IT equipment and infrastructure.
Information Security:
- Covers both intentional and accidental events
- Threat agents can be humans or acts of nature
- People can cause harm by accident or by intent
What is the definition of information security according to ISO27000?
Preservation of confidentiality, integrity and availability of information.
What is Information Security Management, and what does it focus on?
IS management consists of activities to control and reduce risk of damage to information assets.
IS management focuses on:
- Evaluate threats, vulnerabilities and risks
- Control security risks by reducing vulnerability to threats
- Detection and response to attacks
- Recovery from damage caused by attacks
- Investigate and collect evidence about incidents (forensics)
What’s the difference between threat actor and threat scenario?
Threat Actor: An active entity which can execute a threat scenario.
Threat Scenario: The set of steps executed in a (potential) cyber attack.
(When simply using the term “threat”, it usually means a threat scenario)
What’s a vulnerability?
Weaknesses or opportunities allowing a threat scenario to be executed
What’s a security risk?
The likelihood (ease of executing a threat scenario), combined with the potential damage in case of an incident (successful attack).
What’s a security control?
A method for removing vulnerabilities and reducing security risk.
Name the three general security control types, and explain them.
Preventive controls:
prevent attempts to exploit vulnerabilities
Example: encryption of files
Detective controls:
warn of attempts to exploit vulnerabilities
Example: Intrusion detection systems (IDS)
Corrective controls:
correct errors or irregularities that have been detected.
Example: Restoring all applications from the last known good image to bring a corrupted system back online
Use a combination of controls to help ensure that the organisational processes, people, and
technology operate within prescribed bounds.
Information security involves protecting information assets from harm or damage.
“Information” is considered in one of three possible states:
During storage
- Information storage containers
- Electronic, physical, human
During transmission
- Physical or electronic
During processing (use)
- Physical or electronic
- Security controls for all information states are needed
What is the relation between security services and goals?
A security service supports a general security goal. The traditional definition of information security is to ensure the three CIA security services/ goals for data and systems, which is Confidentiality, Integrity and Availability.
CIA are the three main security services and goals.
DATA PRIVACY is an additional goal which relies on CIA. —> CIAP
What is the definition of integrity according to ISO2700?
The property of accuracy and completeness.
What are the two types of integrity?
Data integrity:
The property that data has not been altered or destroyed in an unauthorised manner.
System integrity:
The property of accuracy and completeness.
Can include the accountability of actions
What are the main threats to integrity?
- Data and system corruption
- Loss of accountability
What are the security controls for integrity?
- Hashing, cryptographic integrity check and encryption
- Authentication, access control and logging
- Software digital signing
- Configuration management and change control (system integrity)
General controls also include:
Secure System Development, Incident Response
What is the definition of Confidentiality according to ISO27000?
The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.
Can be divided into:
Secrecy: Protecting business data
Privacy: Protecting personal data
Anonymity: Hide who is engaging in what actions