IA 2 - UNIT 1 Flashcards
is data endowed with relevance and purpose.
Converting data into information thus requires knowledge.
Knowledge by definition is specialized
Information
And what characteristics should information possess to be useful
- accurate,
- timely,
- complete,
- verifiable,
- consistent,
- available
raw facts with an unknown coding system
Noise
raw facts with a known coding system
Data
processed data
Information
accepted facts, principles, or rules of thumb that are useful for specific domains. Knowledge can be the result of inferences and implications produced from simple information facts
Knowledge
- Actions taken that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and non-repudiation.
- This includes providing for restoration of information systems by incorporating protection, detection and reaction capabilities
assurance
study of how to protect your information assets from destruction, degradation, manipulation and exploitation. But also, how to recover should any of those happen
Information Assurance (IA)
timely, reliable access to data and information services for authorized users
Availability
protection against unauthorized modification or destruction of information
Integrity
assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender’s identity, so that neither can later deny having processed the data
Non-repudiation
assurance that information is not disclosed to unauthorized persons
Confidentiality
broad field that there is no universally accepted definition.
Researchers often give their own
spin to IA, usually reflecting their own concerns.
Information Assurance
security measures to establish validity of a transmission, message, or originator
Authentication
According to Debra Herrmann, IA has four major categories
- physical security
- personnel security
- IT security
- operational security
Four Security Domains
- Physical security
- Personnel security
- IT security
- Operational security
a variety of ongoing measures taken to reduce the likelihood and severity of accidental and intentional alteration, destruction, misappropriation, misuse, misconfiguration, unauthorized distribution, and unavailability of an organization’s logical and physical assets, as the result of action or inaction by insiders and known outsiders, such as business partners
Personnel security
refers to the protection of hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services and loss of assets
Physical security
inherent technical features and functions that collectively contribute to an IT infrastructure achieving and sustaining confidentiality, integrity, availability, accountability,
authenticity, and reliability
IT security
involves the implementation of standard operational security procedures that define the nature and frequency of the interaction between users, systems, and system resources, the purpose which to
- achieve and sustain a known secure system state at all times, and
- prevent accidental or intentional theft, release, destruction, alteration, misuse, or sabotage of system resources
Operational security
IA Levels
- Physical
- Infrastructure
- Perceptual
- The second level focus of IA is the information structure level.
- This covers information and data manipulation ability maintained in cyberspace, including: data structures, processes and programs, protocols, data content and databases.
- Desired Effects: to influence the effectiveness and performance of information functions supporting perception, decision making, and control of physical processes.
- Attacker’s Operations: impersonation, piggybacking, spoofing, network attacks, malware, authorization attacks, active misuse, and denial of service attacks.
- Defender’s Operations: information security technical measures such as: encryption and key management, intrusion detection, anti-virus software, auditing, redundancy, firewalls, policies and standards.
IA Levels: Infrastructure
- The third level focus of IA also called social engineering.
- This is abstract and concerned with the management of perceptions of the target, particularly those persons making security decisions.
Desired Effects: to influence decisions and behaviors. Attacker’s Operations: psychological operations such as: deception, blackmail, bribery and corruption, social engineering, trademark and copyright infringement, defamation, diplomacy, creating distrust. - Defender’s Operations: personnel security including psychological testing, education, and screening such as biometrics, watermarks, keys, passwords.
IA Levels: Perceptual
- The lowest level focus of IA: computers, physical networks, telecommunications and supporting systems such as power, facilities and environmental controls.
- Also at this level are the people who manage the systems.
- Desired Effects: to affect the technical performance and the capability of physical systems, to disrupt the capabilities of the defender.
- Attacker’s Operations: physical attack and destruction, including: electromagnetic attack, visual spying, intrusion, scavenging and removal, wiretapping, interference, and eavesdropping.
- Defender’s Operations: physical security, OPSEC, TEMPEST.
IA Levels: the Physical
Note that IA is both proactive and reactive involving:
- protection,
- detection,
- capability restoration,
- response.
IA Functional Components
- IA environment protection pillars
- Attack detection:
- Capability restoration:
- Attack response:
ensure the availability, integrity, authenticity, confidentiality, and non-repudiation of information”
IA environment protection pillars
timely attack detection and reporting is key to initiating the restoration and response processes
Attack detection
relies on established procedures and mechanisms for prioritizing restoration of essential functions. Capability restoration may rely on backup or redundant links, information system components, or alternative means of information transfer
Capability restoration
relies on established procedures and mechanisms for prioritizing restoration of essential functions. Capability restoration may rely on backup or redundant links, information system components, or alternative means of information transfer
Capability restoration
involves determining actors and their motives, establishing cause and complicity, and may involve appropriate action against perpetrators… contributes … by removing threats and enhancing deterrence
Attack response
a computing environment is made up of five continuously interacting components
- activities,
- people,
- data,
- technology,
- networks.
types of assets
- physical asset
- logical assets:
- system assets:
logical assets
information, data (in transmission, storage, or processing), and intellectual property;
physical assets:
devices, computers, people;
the items being protected by the system (documents, files, directories, databases, transactions, etc.)
Objects
system assets
any software, hardware, data, administrative, physical, communications, or personnel resource within an information system.
entities (users, processes, etc.) that execute activities and request access to objects.
Subjects
operations, primitive or complex, that can operate on objects and must be controlled.
Actions