Information Security Risk Management Flashcards
a combination of public and private clouds
Hybrid cloud
a cloud service reserved for only one customer or company
Private cloud
IaaS
(Infrastructure-as-a-Service)
Paas
(Platform-as-a-Service)
SaaS
(Software-as-a-Service)
a cloud-based system managed by a cloud provider and shared among multiple customers, like
Public cloud
It’s simply means that the application is running in a shared environment. Businesses must make sure that there is adequate isolation between different processes in shared environments.
Cloud Security
The sender must not be able to deny sending the data or communication.
(non-repudiation)
The recipient should be able to ______ the sender,
authenticate
Its _______ must be maintained in transit (meaning the data isn’t altered)
integrity
Information must be kept __________
confidential
are commonly used in cryptography to validate the authenticity of data.
Digital Signatures
Encrypting data in transit and data at rest helps ensure data confidentiality and integrity.
Encryption
Validates that a user has permission to access the application by comparing the user’s identity with a list of authorized users
Authorization
Software developers build procedures into an application to ensure that only authorized users gain access to it. This procedure ensure that a user is who they say they are.
Authentication
Involves using a mathematical algorithm called a hash function to convert input data into a fixed-size string of characters, known as a hash value or hash code.
Hash Function
- One key is used to only encrypt the data (the public key) and another key is used to decrypt (the private key).
Asymmetric Cryptography
The same key used to encrypt the data is used to decrypt the data. This makes sharing the key difficult, as anyone who intercepts the message and sees the key can then decrypt your data
Symmetric Cryptography
Resource owners can manage access using discretionary access control (DAC).
Discretionary Access Control (DAC):
Authorization based on preestablished rules is known as rule-based authorization.
Rule-Based Authorization:
ABAC bases choices on the user, resource, and context attributes. It makes use of rules that specify circumstances affecting these characteristics.
ABAC (Attribute-Based Authorization):
Role-Based Authorization (RBAC): RBAC grants access permissions based on the roles allocated to users.
Authorization
This authorization technique verifies the user using the authorization server’s authentication. an interoperable authentication protocol based on the OAuth 2.0 framework of specifications
OpenID Authorization
This authorization technique enables an API to authenticate and provide access (access token) to the user for the requested resource or action.
Oauth
Its primary role in online security is that it enables you to access multiple web applications using one set of login credentials. It works by passing authentication information in a particular format between two parties, usually an identity provider (idP) and a web application
SAMlL
This authorization technique is a Single Sign-On format, also called SS0, in which the authentication information is transferred through XML documents signed digitally
SAML (Security Assertion Markup Language):
Validates that a user has permission to access the application by comparing the user�s identity with a list of authorized users
AUTHORIZATION
The best authentication method should not compromise a user�
PRIVACY
If your authentication process ask the user to follow too many instructions, or if it takes too long, or it needs repeated attempts before succeeds, there�s a risk of drop-offs and lost business, this impacts any organization, whether it�s a retailer dealing with abandoned baskets or citizens failing to return to access online government services
COMPLETION RATES
Its possible to make things too easy
REASSURANCE
Customers value convenience, and some authentication methods are better than others in this regard
CONVENIENCE
If authentication is overly complex, people find workarounds � consider who your service is aimed at but remember to be inclusive, most online services need to offer maximum inclusivity, so simplicity and effortlessness are always the aim
USABILITY
If the risk profile of the transaction is high, you�ll need a more secure method of authentication
SECURITY
Where you are
LOCATION FACTOR