Introduction Flashcards
Security
Protecting assets from harm or damage
Computer security
Protecting information assets from damage or harm
Information assets
Data files, software, IT equipment and infrastructure
Information security
The protection of information and its critical elements including systems and hardware that use, store, transmit that information
Information security properties
Confidentiality, Integrity, Availability
Authenticity, Accountability, Non-repudiation, Reliability
Repudiating meaning
Refuse to accept
Non-repudiation meaning
Cannot repudiate with undeniable evidence.
Data integrity and origin can be verified by a third party.
Replaceable assets
Hardware, software
Irreplaceable assets
Data, individual application
Confidentiality concepts
Data confidentiality and Privacy.
Integrity concepts
Data Integrity and System Integrity
Availability goal
Ensure access and use of information is timely and reliable
Integrity goal
Guarding against improper information modification and destruction.
Ensure information non-repudiation and authenticity
Confidentiality goal
Preserving authorized restrictions on information access and disclosure
Protecting privacy and proprietary information
Confidentiality definition
Hiding the existence and concealment of information and resources
Integrity definition
Authentication and trustworthiness of information and resources.
Correctness of data.
Availability definition
Ability to use info and resources.
Accessible and usable upon demand by an authorized entity.
Confidentiality (SECRECY)
Protecting business data
Confidentiality (PRIVACY)
Protecting personal data
Confidentiality (ANONYMITY)
Hide who is engaging in what actions
Confidentiality Tools
Encryption
Access control
Integrity tools
Prevention
Detection
Availability tools
System design
Statistical model of use
Confidentiality threat
Information theft
Unintentional disclosure