Information Security 2 Flashcards
INFORMATION ASSURANCE
Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and
non-repudiation.
INFORMATION SECURITY
Preservation of confidentiality, integrity and availability of information. In addition, other properties, such as authenticity, accountability, non-repudiation, and reliability can also be involved.
KEY PRINCIPLES OF
INFORMATION SECURITY
- confidentiality
- integrity
- availability
CONFIDENTIALITY
The act of protecting data from being observed by any
unauthorized persons
AVAILABILITY
The act in which Information is accessible by authorized users whenever they request the information
INTEGRITY
The act of maintaining and assuring the accuracy and completeness of data over its entire lifecycle
CYBERSECURITY
- is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
- ensures the security and maintenance of the organization and user’s assets include the computing devices, personnel, infrastructure, applications, services, telecommunications systems and the totality of transmitted and/or stored information in the cyber environment.
The general security objectives comprise the following:
- Availability
- Integrity, which may include authenticity and non-repudiation
- Confidentiality
Organization and User’s
Assets
- personnel/user domain
- computing devices
- infrastructure
- network
- services
- telecommunications
- system/application
Cybersecurity vs. Information Security:
CYBERSECURITY
- all about protecting data that is found in electronic form (such as computers, servers, networks, mobile devices, etc.) from being compromised or attacked.
- Cybersecurity involves identifying what the critical data is, where it resides, its risk exposure, and the technology you have to implement in order to protect it
Cybersecurity vs. Information Security:
INFORMATION SECURITY
is another way of saying “data security.” For a more technical definition, NIST defines information security as “the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
Security of network and information systems Security of network and information systems
ability of network and information systems to resist, at a given level of confidence, any action that compromises the availability, authenticity, integrity or confidentiality of stored or transmitted or processed data or the related services offered by, or accessible via, those network and information systems.
Phases of a Security Lifecycle
- identify
- prevent
- detect
- respond
- recover
IDENTIFY
developing the organisational understanding to manage cybersecurity risk to systems, assets, data and capabilities
PREVENT
safeguards to ensure delivery of critical infrastructure services
DETECT
activities to identify the occurrence of a cybersecurity event
RESPOND
activities to take action regarding a detected cybersecurity event
RECOVER
maintaining plans for resilience and restoring any capabilities or services impaired due to a cybersecurity event
DISCIPLINES CONTRIBUTING TO
INFORMATION SECURITY
- business
- economics
- education
- law
- mathematics
- psychology
BUSINESS
appreciating the organisational context in which the
protection is required and the importance of security in terms of areas such as maintaining brand reputation, supporting business continuity and minimising business risk.
ECONOMICS
understanding the value of security controls relative to costs of exposure and linking to factors such as return on (security) investment
EDUCATION
supporting areas such as user awareness and training, each being steps towards the boarder goal of achieving a security culture amongst the staff community
LAW
recognising the laws that require us to preserve security, and those relevant in a response to incidents, as well as linking to criminology in relation to understanding the nature and motivation of some of the attackers that may be faced
MATHEMATICS
providing the underpinnings for a variety of security techniques, including cryptography and access control.
PSYCHOLOGY
helping us to understand how users perceive issues such as security and trust, as well as predicting how users may behave in risk scenarios and the factors that may influence their response
Three types of users
- malicious users,
- untrained users,
- careless user
USER
considered to be the weakest link in information security.They are malicious users, untrained users, and careless users
Weakest Link in the Security of an
IT Infrastructure
- users
- human error
- common threat
HUMAN ERROR
is a major risk and threat to any organization
Related Areas supported by security
- artificial intelligence
- system analysis and design
- software engineering
- networking
- computer science
- database
- human computer interaction
COMMON THREATS
hacking and phishing and malware threats such as viruses, worms and Trojan horses
ARTIFICIAL INTELLIGENCE
AI techniques have significant potential to aid security technologies and decision processes, need to be secure against compromise, given the increasing trust and reliance that is placed on them
DATABASE
Given that database technologies are often used to store the most valuable asset (the data), the security considerations here include preventing unauthorised disclosure and modification of the stored data,
HUMAN COMPUTER INTERACTION
Systems that are designed and implemented without taking their users into account can often end up causing mistakes, which in turn could compromise security
NETWORKING
data is sent over the network, and the network connections seeking to protect, it is important to consider the security at the networking level in terms of protecting data in transit and controlling the permitted connectivity between the end-systems and devices
SOFTWARE ENGINEERING
Recognising that many vulnerabilities can also occur as a result of the way code was written rather than a fundamental design flaw
SYSTEMS ANALYSIS AND DESIGN
Security needs to be considered within the specification and design of new systems, such that it is recognised and incorporated from the outset rather than needing to be retrofitted at a later stage
Elements of information security puzzle
- Technical
- Procedural
- Personnel
- Legal
- Physical
IMPACTS ON SECURITY BREACH
- disclosure
- denial of access
- modification
- destruction
DISCLOSURE
data is disclosed to an unauthorised party
DENIAL OF ACCESS
data, or a system containing it, becomes unavailable
MODIFICATION
data is changed as a result of the breach
DESTRUCTION
data is lost as a result of the breach
9 Steps for Information Risk
Management Regime
- secure configuration
- network security
- managing user privileges
- user education and awareness
- incident management
- malware prevention
- monitoring
- removable media controls
- home and mobile working