Infosec Bootcamp Day 1 Flashcards
Identification, Authentication, Authorization
- Identification - identifying factors of user
- Authentication - confirming identification of user
- Authorization - once I&A is completed, system will authorize user based on permissions
Protecting Integrity
- Least privilege - only giving access based on need to know
- Separation of duties - different parts of process is done by different personnel to ensure integrity of process
- Rotation of Duties - determines if primary user is doing something wrong
Protecting Availability
- Redundancy - multiple instances of critical components
- **Fault Tolerance **- systems can suffer disruption and continue to run
- Contingency Planning - i.e. Back up plans
Non-repudiation
Sender cannot deny having sent a message to recipient
Bulk Data is typically sent with what kind of algorithm?
Symmetric!! i.e. AES, private key cryptography
- Data owner
- Data custodian
* data owner - classifies data and determines who needs access
* data custoadian - day to day activities; administer, maintain, protect data, back up data
Deming Model
PDCA
* Plan
* Do
* Check
* Act
GDPR drivers
OECD Fair Information Practices
Privacy Law
- Criminal Law
- Common Law
- Civil (Tort) Law
- Administrative Law
Code of Ethics
Calculation of ALE
Tonardo is estimated to damage 50% of a facility if it hits. The value of the facility is $1,000,000. What is the probability of one tornado in ten years?
AV x EF = SLE
1,000,000 x .5 = 500,000
SLE x ARO = ALE
500k x 1/10 = 50k
STRIDE
- Spoofing - false identity
- Tampering - unauthorized changes
- Repudiation - attacker deny having performed action
- Information disclosure
- Denial of service
- Elevation of privilege
BIS
CFAA
ECPA
COPPA
Bureau of Industry and Security - sets regultaions on export of encryption products outside of U.S.
CFAA - computer fraud
ECPA - governemnt wiretap restrictions
COPPA - children’s online privacy protection act