IA 2 - UNIT 1 Flashcards

1
Q

is data endowed with relevance and purpose.
Converting data into information thus requires knowledge.
Knowledge by definition is specialized

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

And what characteristics should information possess to be useful

A
  1. accurate,
  2. timely,
  3. complete,
  4. verifiable,
  5. consistent,
  6. available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

raw facts with an unknown coding system

A

Noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

raw facts with a known coding system

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

processed data

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

accepted facts, principles, or rules of thumb that are useful for specific domains. Knowledge can be the result of inferences and implications produced from simple information facts

A

Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Actions taken that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and non-repudiation.
  • This includes providing for restoration of information systems by incorporating protection, detection and reaction capabilities
A

assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

study of how to protect your information assets from destruction, degradation, manipulation and exploitation. But also, how to recover should any of those happen

A

Information Assurance (IA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

timely, reliable access to data and information services for authorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

protection against unauthorized modification or destruction of information

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender’s identity, so that neither can later deny having processed the data

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

assurance that information is not disclosed to unauthorized persons

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

broad field that there is no universally accepted definition.
Researchers often give their own
spin to IA, usually reflecting their own concerns.

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

security measures to establish validity of a transmission, message, or originator

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

According to Debra Herrmann, IA has four major categories

A
  1. physical security
  2. personnel security
  3. IT security
  4. operational security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Four Security Domains

A
  1. Physical security
  2. Personnel security
  3. IT security
  4. Operational security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a variety of ongoing measures taken to reduce the likelihood and severity of accidental and intentional alteration, destruction, misappropriation, misuse, misconfiguration, unauthorized distribution, and unavailability of an organization’s logical and physical assets, as the result of action or inaction by insiders and known outsiders, such as business partners

A

Personnel security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

refers to the protection of hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services and loss of assets

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

inherent technical features and functions that collectively contribute to an IT infrastructure achieving and sustaining confidentiality, integrity, availability, accountability,
authenticity, and reliability

A

IT security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

involves the implementation of standard operational security procedures that define the nature and frequency of the interaction between users, systems, and system resources, the purpose which to

  • achieve and sustain a known secure system state at all times, and
  • prevent accidental or intentional theft, release, destruction, alteration, misuse, or sabotage of system resources
A

Operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IA Levels

A
  1. Physical
  2. Infrastructure
  3. Perceptual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • The second level focus of IA is the information structure level.
  • This covers information and data manipulation ability maintained in cyberspace, including: data structures, processes and programs, protocols, data content and databases.
  • Desired Effects: to influence the effectiveness and performance of information functions supporting perception, decision making, and control of physical processes.
  • Attacker’s Operations: impersonation, piggybacking, spoofing, network attacks, malware, authorization attacks, active misuse, and denial of service attacks.
  • Defender’s Operations: information security technical measures such as: encryption and key management, intrusion detection, anti-virus software, auditing, redundancy, firewalls, policies and standards.
A

IA Levels: Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  • The third level focus of IA also called social engineering.
  • This is abstract and concerned with the management of perceptions of the target, particularly those persons making security decisions.
    Desired Effects: to influence decisions and behaviors. Attacker’s Operations: psychological operations such as: deception, blackmail, bribery and corruption, social engineering, trademark and copyright infringement, defamation, diplomacy, creating distrust.
  • Defender’s Operations: personnel security including psychological testing, education, and screening such as biometrics, watermarks, keys, passwords.
A

IA Levels: Perceptual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • The lowest level focus of IA: computers, physical networks, telecommunications and supporting systems such as power, facilities and environmental controls.
  • Also at this level are the people who manage the systems.
  • Desired Effects: to affect the technical performance and the capability of physical systems, to disrupt the capabilities of the defender.
  • Attacker’s Operations: physical attack and destruction, including: electromagnetic attack, visual spying, intrusion, scavenging and removal, wiretapping, interference, and eavesdropping.
  • Defender’s Operations: physical security, OPSEC, TEMPEST.
A

IA Levels: the Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Note that IA is both proactive and reactive involving:

A
  1. protection,
  2. detection,
  3. capability restoration,
  4. response.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IA Functional Components

A
  1. IA environment protection pillars
  2. Attack detection:
  3. Capability restoration:
  4. Attack response:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ensure the availability, integrity, authenticity, confidentiality, and non-repudiation of information”

A

IA environment protection pillars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

timely attack detection and reporting is key to initiating the restoration and response processes

A

Attack detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

relies on established procedures and mechanisms for prioritizing restoration of essential functions. Capability restoration may rely on backup or redundant links, information system components, or alternative means of information transfer

A

Capability restoration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

relies on established procedures and mechanisms for prioritizing restoration of essential functions. Capability restoration may rely on backup or redundant links, information system components, or alternative means of information transfer

A

Capability restoration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

involves determining actors and their motives, establishing cause and complicity, and may involve appropriate action against perpetrators… contributes … by removing threats and enhancing deterrence

A

Attack response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

a computing environment is made up of five continuously interacting components

A
  1. activities,
  2. people,
  3. data,
  4. technology,
  5. networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

types of assets

A
  1. physical asset
  2. logical assets:
  3. system assets:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

logical assets

A

information, data (in transmission, storage, or processing), and intellectual property;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

physical assets:

A

devices, computers, people;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

the items being protected by the system (documents, files, directories, databases, transactions, etc.)

A

Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

system assets

A

any software, hardware, data, administrative, physical, communications, or personnel resource within an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

entities (users, processes, etc.) that execute activities and request access to objects.

A

Subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

operations, primitive or complex, that can operate on objects and must be controlled.

A

Actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

the information is genuine

A

authenticity

41
Q

authorized users are able to access it

A

availability

42
Q

Threats can be categorized by ____: accidental or purposeful (error, fraud, hostile intelligence);

A

intent

43
Q

the information is free of error and has the value expected

A

accuracy

44
Q

Examples of Threats

A
  1. Interruption
  2. Interception
  3. Modification
  4. Fabrication
45
Q

assets is one that has known threats. Example: locating an asset in a war zone or a flood zone, or placing an unprotected machine on the Internet.

A

A hostile environment

46
Q

is a category of entities, or a circumstance, that poses a potential danger to an asset (through unauthorized access, destruction, disclosure, modification or denial of service).

A

threat

47
Q

the information has value for the intended purpose

A

utility

48
Q

the information has not been disclosed to unauthorized parties;

A

confidentiality

49
Q

Threats can be categorized by ____: type of asset, consequences.

A

impact

50
Q

Threats can be categorized by the kind of ____ involved: human (hackers, someone flipping a switch), processing (malicious code, sniffers), natural (flood, earthquake);

A

entity

51
Q

is a specific instance of a threat, e.g. a specific hacker, a particular storm, etc.

A

threat actor

52
Q

the information is whole, complete and uncorrupted;

A

Integrity

53
Q

the data is under authorized ownership and control.

A

possession:

54
Q

an unauthorized party tampers with an asset.

A

Modification

55
Q

an asset becomes unusable, unavailable, or lost

A

Interruption

56
Q

an unauthorized party gains access to an information asset.

A

Interception:

57
Q

an asset has been counterfeit.

A

Fabrication:

58
Q

a nonhostile environment that may be protected from external hostile elements by physical, personnel, and procedural countermeasures.

A

A benign environment

59
Q

a collection of computing environments connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security.

A

An enclave

60
Q

weakness or fault in a system that exposes information to attack.

A

vulnerability

61
Q

a method for taking advantage of a known vulnerability.

A

exploit

62
Q

one for which there is no known threat (vulnerability is there but not exploitable).

A

A dangling vulnerability

63
Q

one that does not pose a danger as there is no vulnerability to exploit (threat is there, but can’t do damage).

A

A dangling threat

64
Q

Three types of attacks

A
  1. passive attack
  2. active attack
  3. unintentional attack
65
Q

an attack in which the attacker observes interaction with the system.

A

Passive attack

66
Q

an attempt to gain access, cause damage to or otherwise compromise information and/or systems that support it.

A

An attack

67
Q

an attack where there is not a deliberate goal of misuse

A

Unintentional attack:

68
Q

attack in which the attacker directly interacts with the system.

A

Active attack

69
Q

the active entity, usually a threat actor, that interacts with the system.

A

Attack subject

70
Q

an organization/entity is the set of ways in which an adversary can enter the system and potentially cause damage.

A

The attack surface

71
Q

the targeted information system asset.

A

Attack object

72
Q

an instance when the system is vulnerable to attack.

A

Exposure

73
Q

is a situation in which the attacker has succeeded.

A

compromise

74
Q

is a recognized action—specific, generalized or theoretical—that an adversary (threat actor) might be expected to take in preparation for an attack.

A

indicator

75
Q

is the outcome of an attack. In a purposeful threat, the threat actor has typically chosen a desired consequence for the attack, and selects the IA objective to target to achieve this.

A

consequence

76
Q

Disruption: targets availability

A

Disruption

77
Q

targets confidentiality

A

Exploitation:

78
Q

targets integrity

A

Corruption:

79
Q

is a type of consequence, involving accidental exposure of information to an agent not authorized access.

A

Inadvertant disclosure

80
Q

process for an organization to identify and address the risks in their environment.

A

Risk management

81
Q

are any actions, devices, procedures, techniques and other measures that reduce the vulnerability of an information system.

A

Controls, safeguards and countermeasures

82
Q

kindsn of controls, safeguards and countermeasures

A
  1. technical
  2. policy, procedures and practices education, training and awareness cover and deception (camouflage)
  3. human intelligence (HUMINT), e.g. disinformation
  4. monitoring of data and transmissions
  5. surveillance countermeasures that detect or neutralize sensors,
  6. e.g. TEMPEST
  7. assessments and inspections.
83
Q

A security profile is the implementation (policy, procedures, technology) of the security effort within an organization.

A

security posture

84
Q
  • is the possibility that a particular threat will adversely impact an information system by exploiting a particular vulnerability.
  • The assessment of risk must take into account the consequences of an exploit.
A

Risk

85
Q

One particular risk management procedure (from Viega and McGraw) consists of six steps:

A
  1. Assess assets
  2. Assess threats
  3. Assess vulnerabilities
  4. Assess risks
  5. Prioritize countermeasure options
  6. Make risk management decisions
86
Q
  • risks not avoided or transferred are retained by the organization.
  • E.g. sometimes the cost of insurance is greater than the potential loss.
  • Sometimes the loss is improbable, though catastrophic.
A

Risk acceptance:

87
Q

not performing an activity that would incure risk.

A

Risk avoidance

88
Q
  • shift the risk to someone else.
  • E.g. most insurance contracts, home security systems.
A

Risk transfer:

89
Q

taking actions to reduce the losses due to a risk; many technical countermeasures fall into this category.

A

Risk mitigation:

90
Q

are the security features of a system that provide enforcement of a security policy.

A

Trust mechanisms

91
Q

is about preventing the risk from being actualized. E.g., not parking in a high crime area.

A

Risk avoidance

92
Q

is about limiting the damage should the risk be actualized. E.g., having a LoJack or cheap car stereo.

A

Risk mitigation

93
Q

generic term that implies a mechanism in place to provide a basis for confidence in the reliability/security of the system. Failure of the mechanism may destroy the basis for trust.

A

Trust

94
Q

is a collection of all the trust mechanisms of a computer system which collectively enforce the policy.

A

The trusted computing base (TCB)

95
Q

a measure of confidence that the security features, practices, procedures, and architecture of a system accurately mediates and enforces the security policy.

A

Assurance

96
Q

The concept of ____ provides a unified approach to conceptualizing (parts of) IA.

A

trust management

97
Q

waterfall model

A
  1. Requirements
  2. Design
  3. Coding
  4. Testing
  5. Deployment
  6. Production
  7. Decommission
98
Q

the process by which an asset is managed from its arrival or creation to its termination or destruction.

A

lifecycle

99
Q

is a process by which the project managers for a system will ensure that appropriate information assurance safeguards are incorporated into a system.

A

Security systems lifecycle management