General Security Concepts Flashcards
Definition of information security (ISO27000)
Definisjonen av informasjonssikkerhet i følge ISO27000 er bevaring av konfidensialitet, integritet og tilgjengelighet av informasjon. I tillegg kan andre egenskaper som authenticity, accountability, non-repudiation og reliabilty bli involvert.
Ordrett: “The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved. “
Definitions of CIA services
De tre hoved sikkerhetstjenestene og målene Confidentiality, Integrity and Availability.
Privacy
Data privacy. Protecting personal data. Data Privacy
To protect specific aspects of information that may be related
to natural persons (personal information).
• Prevent unauthorized collection and storage of personal information
• Prevent unauthorized use of collected personal information
• Make sure your personal information is correct
GDPR
General Data Protection Regulation (Personvernsloven)
authentication
Bekrefter identiteten til brukeren eller systemet som opprettet informasjonen
non-repudiation
Sikrer at avsenderen ikke kan benekte å ha sendt meldingen.(Strong form of Data Authentication)
Goal: Making sending and receiving messages undeniable through unforgible evidence.
– Non-repudiation of origin: proof that data was sent.
– Non-repudiation of delivery: proof that data was received.
Threat:
– Sender falsely denying having sent message
– Recipient falsely denying having received message
Control: digital signature
access control
Selektiv begrensning av tilgang til data og ressurser.
authorization
Ved å bevise identitet, blir personen deretter utstyrt med nøkkelen eller passordet som vil gi tilgang til en eller annen ressurs
3 categories of security controls
physical, technical, administrative
physical security control
- Facility protection
- Security guards
- Locks
- Monitoring
- Environmental controls
- Intrusion detection
technical security control
- Logical access control
- Cryptographic controls
- Security devices
- User authentication
- Intrusion detection
- Forensics
administrative security control
- Policies & standards
- Procedures & practice
- Personnel screening
- Awareness training
- Secure System Dev.
- Incident Response
Preventive security controls
prevent attempts to exploit vulnerabilities
Example: encryption of files
Detective security controls
warn of attempts to exploit vulnerabilities
Example: Intrusion detection systems (IDS)
Corrective security controls
correct errors or irregularities that have been detected.
Example: Restoring all applications from the last known good image to bring a corrupted system back online