Information Assurance Flashcards
is data endowed with relevance and purpose
Information
Useful characteristics that the information should possess
Timely
Accurate
Complete
Verifiable
Consistent
Available
the following are all aspects of
system quality:
functionality
adequacy
interoperability
correctness
security
reliability
usability
efficiency
maintainability
portability
what characteristics should information possess to be useful?
accurate,
timely,
complete,
verifiable,
consistent,
available
all distinct
conceptual resources:
Noise
Data
Information
Knowledge
raw facts with an unknown coding system
Noise
raw facts with a known coding system
Data
processed data
Information
: accepted facts, principles, or rules of thumb that are
useful for specific domains. Knowledge can be the
result of inferences and implications produced from
simple information facts.
Knowledge
Actions taken that protect and defend information and
information systems by ensuring their availability,
integrity, authentication, confidentiality and
non-repudiation. This includes providing for restoration
of information systems by incorporating protection,
detection and reaction capabilities.
IA
is the study of how to protect your
information assets from destruction, degradation, manipulation and
exploitation. But also, how to recover should any of those happen.
Notice that it is both proactive and reactive.
Information Assurance
According to the DoD definition, these are some aspects of
information needing protection:
Availability
Integrity
Confidentiality
Authentication
Non-repudation
assurance that the sender is provided with proof
of a data delivery and recipient is provided with proof
of the sender’s identity, so that neither can later deny
having processed the data.
Non-repudiation:
security measures to establish the validity of a
transmission, message, or originator.
Authentication:
assurance that information is not disclosed to
unauthorized persons;
Confidentiality:
protection against unauthorized modification or
destruction of information;
Integrity:
timely, reliable access to data and information
services for authorized users;
Availability:
According to Debra Herrmann (Complete Guide to Security and
Privacy Metrics), IA should be viewed as spanning four security
engineering domains:
physical security
personnel security
IT security
operational security
The simple truth is that IT security cannot be
accomplished in a vacuum, because there are a multitude
of dependencies and interactions among all four security
engineering domains
(Herrmann, p. 10
refers to the protection of hardware, software,
and data against physical threats to reduce or prevent disruptions
to operations and services and loss of assets.
“Physical security
is a variety of ongoing measures taken to
reduce the likelihood and severity of accidental and intentional
alteration, destruction, misappropriation, misuse, misconfiguration,
unauthorized distribution, and unavailability of an organization’s
logical and physical assets, as the result of action or inaction by
insiders and known outsiders, such as business partners.”
“Personnel security
is the inherent technical features and functions that
collectively contribute to an IT infrastructure achieving and
sustaining confidentiality, integrity, availability, accountability,
authenticity, and reliability.
“IT security
involves the implementation of standard
operational security procedures that define the nature and
frequency of the interaction between users, systems, and system
resources, the purpose of which is to
1 achieve and sustain a known secure system state at all times,
and
2 prevent accidental or intentional theft, release, destruction,
alteration, misuse, or sabotage of system resources.”
Operational security
According to Raggad’s taxonomy of information security, a
computing environment is made up of five continuously interacting
components:
activities,
people,
data,
technology,
networks.
According to Blyth and Kovacich, IA can be thought of as
protecting information at three distinct levels:
Physical
Information Infrastructure
perceptual
knowledge and understanding in human decision
space.
perceptual
data and data processing activities in physical space;
Physical
information and data manipulation
abilities in cyberspace;
information infrastructure:
The lowest level focus of IA , computers,
physical networks, telecommunications and supporting systems
such as power, facilities and environmental controls. Also at this
level are the people who manage the systems.
Physical Level
The second level focus of IA,
This covers information and data manipulation ability maintained
in cyberspace, including: data structures, processes and programs,
protocols, data content and databases
information structure level
The third level focus of IA, also called social
engineering. This is abstract and concerned with the management
of perceptions of the target, particularly those persons making
security decisions.
perceptual level,
COMPSEC
computer security
COMSEC
communications and network security;
ITSEC: (which includes both COMPSEC and COMSEC);
Information Technology Security Evaluation Criteria
OPSEC
operations security
An
attacker on any information system will use
the simplest means of subverting system
security.
Principle of Easiest Penetration
The flip side of Information Assurance
Information Warfare (IW)
involves managing an opponent’s perception through
deception and psychological operations. In military circles,
this is called Truth Projection
Type 1
involves denying, destroying, degrading, or distorting
the opponent’s information flows to disrupt their ability to
carry out or co-ordinate operations.
Type II
gathers intelligence by exploiting the opponent’s use
of information systems.
Type III
the offensive players in the world of IW come in six
types:
Insider
Hacker
Criminals
Corporations
Governments and agencies
Terrorists
usually politically motivated and may seek to cause
maximal damage to information infrastructure as well
as endanger lives and property.
Terrorists