Lecture 1 Flashcards
Information Security Concepts
What is Database Security?
Principles, tools, and policies that protect against database attacks and misuse of data.
List 3 Common database security features:
- Access Control
- Authentication
- Data Encryption
Give an example of Confidentiality, Integrity, and Availability in database security:
Confidentiality: Encrypting stored data.
Integrity: Implementing hashing algorithms to detect unauthorized changes do the data.
Availability: Using a distributed database system with multiple servers.
What is a “social engineer”?
A person who manipulates other people to gain access to systems or information.
Name and explain the 4 phases in the Security Architecture Cycle
1- Assessment & Analysis: listing and evaluating organizational assets and risks via auditing.
2- Design & Modeling: Creating policies and planning for changes to fit business needs.
3- Deployment: Testing then Implementing the security plan.
4- Management and Support: Monitoring performance and reevaluating in case of security failure or negative feedback.
What are the 5 risk assessment steps?
1- List all devices
2- Identify vulnerablities and assets within each device
3- Valuate assets and cost of damage from threats
4- Create security measures mitigate the threats
5- Prioritize the security measures
What are the 5 design steps?
1- Define needed policies and procedures
2- Identify software changes to support the policies
3- Create the deployment plan
4- Create baselines to determine success and failure
5- Create a plan for user awareness training
What are the 3 Deployment steps?
1- Adjust user training as needed
2- Test software changes in a simulated controlled environment
3- Deploy the changes according to the plan
What are the 3 Management and Support steps?
1- Monitor performance
2- Review policies as necessary
3- Identify the need for a reassessment and initiate the start of the security life cycle
Explain “The disaster plan”:
The plan to quickly respond and recover from a human-caused or natural disaster.
List and explain the 3 Physical site recovery options:
Cold Site: basic necessities to rebuild a network.
Warm Site: basic necessities with software and hardware.
Hot Site: exact replica of the network.