Information Assurance 2 Flashcards
The act of protecting data
from being observed by any
unauthorized persons.
CONFIDENTIALITY
The act of maintaining and
assuring the accuracy and
completeness of data over
its entire lifecycle
INTEGRITY
The act in which Information is accessible by
authorized users whenever they request the
information
AVAILABILITY
is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to
protect the cyber environment and organization and user’s assets
Cybersecurity
Is all about protecting data that is found in electronic form.
Cybersecurity
KEY PRINCIPLES OF
INFORMATION SECURITY
- confidentiality
- integrity
- availability
Organization and User’s Assets
- Network
- Services
- Telecommunications
- System/Application
- Personnel/User Domain
- Computing devices
- Infrastructure
Phases of a Security Lifecycle
- identify
- prevent
- detect
- respond
- recover
developing the organisational understanding to manage cybersecurity risk to systems, assets, data and capabilities
IDENTIFY
safeguards to ensure delivery of critical infrastructure services
Prevent
activity to identify the occurrence of a cybersecurity event.
Detect
activities to take action regarding a detected cybersecurity event
RESPOND
maintaining plans for resilience and restoring any capabilities or services impaired due to a cybersecurity event
RECOVER
Disciplines Contributing
To Information Security
- Business
- Economics
- Education
- Law
- Mathematics
- Psychology
appreciating the organisational context in which the protection is required and the importance of security in terms of areas such as maintaining brand reputation, supporting business continuity and minimising business risk.
Business
understanding the value of security controls relative to costs of exposure and linking to factors such as return on (security) investment
Economics
supporting areas such as user awareness and training, each being steps towards the boarder goal of achieving a security culture amongst the staff community
Education
recognising the laws that require us to preserve security, and those relevant in a response to incidents, as well as linking to criminology in relation to understanding the nature and motivation of some of the attackers that may be faced
Law
providing the underpinnings for a variety of security techniques, including cryptography and access control.
Mathematics
helping us to understand how users perceive issues such as security and trust, as well as predicting how users may behave in risk scenarios and the factors that may influence their response
Psychology
Three types of users
- malicious users,
- untrained users,
- careless user
Weakest Link in the Security of an
IT Infrastructure
- user
- human error
- common threats
is considered to be the weakest link in information security.They are malicious users, untrained users, and careless users
USER
hacking and phishing and malware threats such as viruses, worms and Trojan horses
COMMON THREATS