Information Security 2 Flashcards

1
Q

INFORMATION ASSURANCE

A

Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and
non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

INFORMATION SECURITY

A

Preservation of confidentiality, integrity and availability of information. In addition, other properties, such as authenticity, accountability, non-repudiation, and reliability can also be involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

KEY PRINCIPLES OF
INFORMATION SECURITY

A
  1. confidentiality
  2. integrity
  3. availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CONFIDENTIALITY

A

The act of protecting data from being observed by any
unauthorized persons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AVAILABILITY

A

The act in which Information is accessible by authorized users whenever they request the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

INTEGRITY

A

The act of maintaining and assuring the accuracy and completeness of data over its entire lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CYBERSECURITY

A
  • is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
  • ensures the security and maintenance of the organization and user’s assets include the computing devices, personnel, infrastructure, applications, services, telecommunications systems and the totality of transmitted and/or stored information in the cyber environment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The general security objectives comprise the following:

A
  • Availability
  • Integrity, which may include authenticity and non-repudiation
  • Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Organization and User’s
Assets

A
  1. personnel/user domain
  2. computing devices
  3. infrastructure
  4. network
  5. services
  6. telecommunications
  7. system/application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cybersecurity vs. Information Security:
CYBERSECURITY

A
  • all about protecting data that is found in electronic form (such as computers, servers, networks, mobile devices, etc.) from being compromised or attacked.
  • Cybersecurity involves identifying what the critical data is, where it resides, its risk exposure, and the technology you have to implement in order to protect it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cybersecurity vs. Information Security:
INFORMATION SECURITY

A

is another way of saying “data security.” For a more technical definition, NIST defines information security as “the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security of network and information systems Security of network and information systems

A

ability of network and information systems to resist, at a given level of confidence, any action that compromises the availability, authenticity, integrity or confidentiality of stored or transmitted or processed data or the related services offered by, or accessible via, those network and information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phases of a Security Lifecycle

A
  1. identify
  2. prevent
  3. detect
  4. respond
  5. recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IDENTIFY

A

developing the organisational understanding to manage cybersecurity risk to systems, assets, data and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PREVENT

A

safeguards to ensure delivery of critical infrastructure services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DETECT

A

activities to identify the occurrence of a cybersecurity event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RESPOND

A

activities to take action regarding a detected cybersecurity event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RECOVER

A

maintaining plans for resilience and restoring any capabilities or services impaired due to a cybersecurity event

19
Q

DISCIPLINES CONTRIBUTING TO
INFORMATION SECURITY

A
  1. business
  2. economics
  3. education
  4. law
  5. mathematics
  6. psychology
20
Q

BUSINESS

A

appreciating the organisational context in which the
protection is required and the importance of security in terms of areas such as maintaining brand reputation, supporting business continuity and minimising business risk.

21
Q

ECONOMICS

A

understanding the value of security controls relative to costs of exposure and linking to factors such as return on (security) investment

22
Q

EDUCATION

A

supporting areas such as user awareness and training, each being steps towards the boarder goal of achieving a security culture amongst the staff community

23
Q

LAW

A

recognising the laws that require us to preserve security, and those relevant in a response to incidents, as well as linking to criminology in relation to understanding the nature and motivation of some of the attackers that may be faced

24
Q

MATHEMATICS

A

providing the underpinnings for a variety of security techniques, including cryptography and access control.

25
Q

PSYCHOLOGY

A

helping us to understand how users perceive issues such as security and trust, as well as predicting how users may behave in risk scenarios and the factors that may influence their response

26
Q

Three types of users

A
  1. malicious users,
  2. untrained users,
  3. careless user
26
Q

USER

A

considered to be the weakest link in information security.They are malicious users, untrained users, and careless users

26
Q

Weakest Link in the Security of an
IT Infrastructure

A
  1. users
  2. human error
  3. common threat
26
Q

HUMAN ERROR

A

is a major risk and threat to any organization

26
Q

Related Areas supported by security

A
  1. artificial intelligence
  2. system analysis and design
  3. software engineering
  4. networking
  5. computer science
  6. database
  7. human computer interaction
26
Q

COMMON THREATS

A

hacking and phishing and malware threats such as viruses, worms and Trojan horses

26
Q

ARTIFICIAL INTELLIGENCE

A

AI techniques have significant potential to aid security technologies and decision processes, need to be secure against compromise, given the increasing trust and reliance that is placed on them

26
Q

DATABASE

A

Given that database technologies are often used to store the most valuable asset (the data), the security considerations here include preventing unauthorised disclosure and modification of the stored data,

26
Q

HUMAN COMPUTER INTERACTION

A

Systems that are designed and implemented without taking their users into account can often end up causing mistakes, which in turn could compromise security

26
Q

NETWORKING

A

data is sent over the network, and the network connections seeking to protect, it is important to consider the security at the networking level in terms of protecting data in transit and controlling the permitted connectivity between the end-systems and devices

27
Q

SOFTWARE ENGINEERING

A

Recognising that many vulnerabilities can also occur as a result of the way code was written rather than a fundamental design flaw

28
Q

SYSTEMS ANALYSIS AND DESIGN

A

Security needs to be considered within the specification and design of new systems, such that it is recognised and incorporated from the outset rather than needing to be retrofitted at a later stage

29
Q

Elements of information security puzzle

A
  1. Technical
  2. Procedural
  3. Personnel
  4. Legal
  5. Physical
30
Q

IMPACTS ON SECURITY BREACH

A
  1. disclosure
  2. denial of access
  3. modification
  4. destruction
31
Q

DISCLOSURE

A

data is disclosed to an unauthorised party

32
Q

DENIAL OF ACCESS

A

data, or a system containing it, becomes unavailable

33
Q

MODIFICATION

A

data is changed as a result of the breach

34
Q

DESTRUCTION

A

data is lost as a result of the breach

35
Q

9 Steps for Information Risk
Management Regime

A
  1. secure configuration
  2. network security
  3. managing user privileges
  4. user education and awareness
  5. incident management
  6. malware prevention
  7. monitoring
  8. removable media controls
  9. home and mobile working