Lesson 1 Flashcards
Confidentiality
• Information should only be known to certain people
Integrity
• Data is stored and transferred as intended and that any modification is
authorized
Availability
• Information is accessible to those authorized to view or modify it
• Non-repudiation
• Subjects cannot deny creating or modifying data
Cybersecurity Framework
Identify, protect, detect, respond, Recover
Information Security Roles and Responsibilities
• Overall responsibility • Chief Security Officer (CSO) • Chief Information Security Officer (CISO) • Managerial • Technical • Information Systems Security Officer (ISSO) • Non-technical • Due care/liability
Information Security Business Units
Security Operations Center (SOC) • DevSecOps • Development, security, and operations • Incident response • Cyber incident response team (CIRT) • Computer security incident response team (CSIRT) • Computer emergency response team (CERT)
Security Control Categories
• Technical • Controls implemented in operating systems, software, and security appliances • Operational • Controls that depend on a person for implementation • Managerial • Controls that give oversight of the system
Security Control Functional Types (1)
Preventive
• Physically or logically restricts
unauthorized access
• Operates before an attack
• Detective • May not prevent or deter access, but it will identify and record any attempted or successful intrusion • Operates during an attack
• Corrective • Responds to and fixes an incident and may also prevent its reoccurrence • Operates after an attack
• Physical
• Controls such as alarms, gateways, and locks that deter access to premises and
hardware
• Deterrent
• May not physically or logically prevent access, but psychologically discourages
an attacker from attempting an intrusion
- Compensating
- Substitutes for a principal control
CSF
(NIST) Cybersecurity Framework
(CSF) is a relatively new addition to the IT governance space and distinct from other
frameworks by focusing exclusively on IT security, rather than IT service provision more
generally
RMF
Risk Managemetn Framework - designed for federal agencies
FIPS
Federal Information Processing Standards (FIPS)
US Gov’t security standars for data and its
ISO 27k
Information Security Standards
ISO 31k
Enterprise risk management
• Cloud Security Alliance
Cloud Security Alliance
• Security guidance for cloud service providers (CSPs)
• Enterprise reference architecture
• Cloud controls matrix