Information Security 2 Flashcards

1
Q

INFORMATION ASSURANCE

A

Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and
non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

INFORMATION SECURITY

A

Preservation of confidentiality, integrity and availability of information. In addition, other properties, such as authenticity, accountability, non-repudiation, and reliability can also be involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

KEY PRINCIPLES OF
INFORMATION SECURITY

A
  1. confidentiality
  2. integrity
  3. availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CONFIDENTIALITY

A

The act of protecting data from being observed by any
unauthorized persons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AVAILABILITY

A

The act in which Information is accessible by authorized users whenever they request the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

INTEGRITY

A

The act of maintaining and assuring the accuracy and completeness of data over its entire lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CYBERSECURITY

A
  • is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
  • ensures the security and maintenance of the organization and user’s assets include the computing devices, personnel, infrastructure, applications, services, telecommunications systems and the totality of transmitted and/or stored information in the cyber environment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The general security objectives comprise the following:

A
  • Availability
  • Integrity, which may include authenticity and non-repudiation
  • Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Organization and User’s
Assets

A
  1. personnel/user domain
  2. computing devices
  3. infrastructure
  4. network
  5. services
  6. telecommunications
  7. system/application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cybersecurity vs. Information Security:
CYBERSECURITY

A
  • all about protecting data that is found in electronic form (such as computers, servers, networks, mobile devices, etc.) from being compromised or attacked.
  • Cybersecurity involves identifying what the critical data is, where it resides, its risk exposure, and the technology you have to implement in order to protect it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cybersecurity vs. Information Security:
INFORMATION SECURITY

A

is another way of saying “data security.” For a more technical definition, NIST defines information security as “the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security of network and information systems Security of network and information systems

A

ability of network and information systems to resist, at a given level of confidence, any action that compromises the availability, authenticity, integrity or confidentiality of stored or transmitted or processed data or the related services offered by, or accessible via, those network and information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phases of a Security Lifecycle

A
  1. identify
  2. prevent
  3. detect
  4. respond
  5. recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IDENTIFY

A

developing the organisational understanding to manage cybersecurity risk to systems, assets, data and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PREVENT

A

safeguards to ensure delivery of critical infrastructure services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DETECT

A

activities to identify the occurrence of a cybersecurity event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RESPOND

A

activities to take action regarding a detected cybersecurity event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RECOVER

A

maintaining plans for resilience and restoring any capabilities or services impaired due to a cybersecurity event

19
Q

DISCIPLINES CONTRIBUTING TO
INFORMATION SECURITY

A
  1. business
  2. economics
  3. education
  4. law
  5. mathematics
  6. psychology
20
Q

BUSINESS

A

appreciating the organisational context in which the
protection is required and the importance of security in terms of areas such as maintaining brand reputation, supporting business continuity and minimising business risk.

21
Q

ECONOMICS

A

understanding the value of security controls relative to costs of exposure and linking to factors such as return on (security) investment

22
Q

EDUCATION

A

supporting areas such as user awareness and training, each being steps towards the boarder goal of achieving a security culture amongst the staff community

23
Q

LAW

A

recognising the laws that require us to preserve security, and those relevant in a response to incidents, as well as linking to criminology in relation to understanding the nature and motivation of some of the attackers that may be faced

24
Q

MATHEMATICS

A

providing the underpinnings for a variety of security techniques, including cryptography and access control.

25
PSYCHOLOGY
helping us to understand how users perceive issues such as security and trust, as well as predicting how users may behave in risk scenarios and the factors that may influence their response
26
Three types of users
1. malicious users, 2. untrained users, 3. careless user
26
USER
considered to be the weakest link in information security.They are malicious users, untrained users, and careless users
26
Weakest Link in the Security of an IT Infrastructure
1. users 2. human error 3. common threat
26
HUMAN ERROR
is a major risk and threat to any organization
26
Related Areas supported by security
1. artificial intelligence 2. system analysis and design 3. software engineering 4. networking 5. computer science 6. database 7. human computer interaction
26
COMMON THREATS
hacking and phishing and malware threats such as viruses, worms and Trojan horses
26
ARTIFICIAL INTELLIGENCE
AI techniques have significant potential to aid security technologies and decision processes, need to be secure against compromise, given the increasing trust and reliance that is placed on them
26
DATABASE
Given that database technologies are often used to store the most valuable asset (the data), the security considerations here include preventing unauthorised disclosure and modification of the stored data,
26
HUMAN COMPUTER INTERACTION
Systems that are designed and implemented without taking their users into account can often end up causing mistakes, which in turn could compromise security
26
NETWORKING
data is sent over the network, and the network connections seeking to protect, it is important to consider the security at the networking level in terms of protecting data in transit and controlling the permitted connectivity between the end-systems and devices
27
SOFTWARE ENGINEERING
Recognising that many vulnerabilities can also occur as a result of the way code was written rather than a fundamental design flaw
28
SYSTEMS ANALYSIS AND DESIGN
Security needs to be considered within the specification and design of new systems, such that it is recognised and incorporated from the outset rather than needing to be retrofitted at a later stage
29
Elements of information security puzzle
1. Technical 2. Procedural 3. Personnel 4. Legal 5. Physical
30
IMPACTS ON SECURITY BREACH
1. disclosure 2. denial of access 3. modification 4. destruction
31
DISCLOSURE
data is disclosed to an unauthorised party
32
DENIAL OF ACCESS
data, or a system containing it, becomes unavailable
33
MODIFICATION
data is changed as a result of the breach
34
DESTRUCTION
data is lost as a result of the breach
35
9 Steps for Information Risk Management Regime
1. secure configuration 2. network security 3. managing user privileges 4. user education and awareness 5. incident management 6. malware prevention 7. monitoring 8. removable media controls 9. home and mobile working