IS 414 CH. 8 Flashcards
Trust Services Framework organizes IT-related controls into five principles
- Security
- confidentiality
- privacy
- processing integrity
- availability
- Security
access (both physical and logical) to the system and its data is controlled and restricted to legitimate users
- confidentiality
sensitive organizational information (marketing plans, trade secrets) is protected from unauthorized disclosure
- privacy
personal info about customers, employees, suppliers, or business partners is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure
- processing integrity
data are processed accurately, completely, in a timely matter, and only with proper authorization
- availability
the system and its information are available to meet operational and contractual obligations
info security
foundation of systems reliability
Security management issue too, not only technology
step 1. assess the information security-related threats that the organization faces and select an appropriate response
step 2. developing info security policies and communicating them to all employees
step 3. acquisition or building of specific technology tools
defense-in-depth
employing multiple layers of controls to avoid a single point-of-failure
involves the use of a combination of preventive, detective, and corrective controls
P = time it takes attacker to break throught
D = time it takes to detect
C = time it takes to respond
if P > D + C = effective
time based model of security
implementing a combo of preventive, detective, and corrective controls that protect info assets long enough to enable an organization to recognize the attack is occurring and take steps to thwart it before any information is lost or compromised
Understanding targeted attacks
- conduct reconnaissance (research) - learn as much as possible about the target to identify vulnerabilities
- Attempt social engineering
- Scan and map target - if the attacker cannot successfully via social engineering, will identify points of remote entry
- Research - find version of software, research vulnerabilities for those programs
- execute the attack
- cover tracks
Preventive control
people - creation of a “security aware” culture, training
processes - under access controls (authentication and authorization)
IT solutions - antimalware, network access controls (Firewalls, intrusion prevention systems, etc), device and software hardening (config. controls), encryption
physical security - access controls (locks, guards)
change controls and change management
Detective
log analysis
intrusion detection systems
penetration testing
continuous monitoring
corrective
computer incident response teams
chief info security officer
patch management
authentication
verifying the identity of the person or device attempting to access the system
- something they know (password, pin)
- something they have (smart cards, ID badges)
- something physical or behavioral characteristic aka biometric identifier (fingerprints, typing patterns)