Lesson 1 Flashcards
This is the study of how to protect your information assets from destruction, degradation, manipulation, and exploitation. But also how to recover should any of those happen
Information Assurance (AI)
What are the five aspects of information needed protection
- Availability
- Integrity
- Confidentiality
- Authentication
- Non-repudiation
This talks about timely, reliable access to data and information services and authorized users
Availability
This talks about protection against unauthorized modification or destruction of information
Integrity
This talks about assurance that information is not disclosed to unauthorized persons
Confidentiality
This talks about security measures to establish the validity of a transmission, message, or originator
Authentication
This talks about the assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender’s identity, so that neither can later deny having processed the data.
Non-repudiation
True or False:
IT security cannot be accomplished in a vacuum, because there are a multitude of dependencies and interactions among all four security engineering domains.
True
What are the four major categories of Information Assurance?
- Physical Security
- Personnel Security
- IT Security
- Operational Security
What are the proper practice of Information Assurance?
- Enforcing hard-to-guess passwords
- Encrypting hard drives
- Locking sensitive documents in a safe
- Assigning security clearances to staffers
- Using SSL for data transfers
- Having off-site backup of documents
This refers to the protection of hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services and loss of assets.
Physical Security
This is a variety of ongoing measures taken to reduce the likelihood and severity of accidental and intentional alteration, destruction, misappropriation, misuse, misconfiguration, unauthorized distribution, and unavailability of an organization’s logical and physical assets, as the result of action or inaction by insiders and known outsiders, such as business partners.
Personnel Security
This is the inherent technical features and functions that collectively contribute to an IT infrastructure achieving and sustaining confidentiality, integrity, availability, accountability, authenticity, and realiability
IT Security
This involves the implementation of standard operational security procedures that define the nature and frequency of the interaction between users, systems, and system resources.
Operational Security
What are the purpose of operational security?
- Achieve and sustain a known secure system state at all time
- Prevent accidental or intentional theft, release, destruction, alteration, misuse, or sabotage of system resources.
According to this, a computing environment is made up of five continuously interacting components. And information assurance includes computer and information security.
Raggad’s Taxonomy of Information Security
What are the five continuously interacting components when it comes to a computing environment?
- Activities
- People
- Data
- Technology
- Networks
According to them, information assurance can be thought of as protecting information at three distinct levels.
Blyth and Kovacich
What are the three distinct levels when it comes information assurance as protecting information?
- Physical
- Information Infrastructure
- Perceptual
This talks about data and data processing activities in physical space.
Physical
This talks about information and data manipulation abilities in cyberspace.
Information Infrastructure
This talks about knowledge and understanding in human decision space.
Perceptual
What is the lowest level focus of Information Assurance
Physical Level
This talks about computers, physical network, telecommunications and supporting systems such as power, facilities and environmental controls. Also at this level are the people who manage the systems.
Physical Level
What is the desired effect in physical level?
This is to affect the technical performance and the capability of physical systems, to disrupt the capabilities of the defender.
What is the attacker’s operations in physical level?
This talks about physical attack and destruction
What are the examples of Attacker’s Operations in Physical level?
- Electromagnetic Attack
- Visual Spying
- Intrusion
- Scavenging and Removal
- Wiretapping
- Interference
- Eavesdropping
What is the Defender’s operation in physical level?
This talks about physical security, operations security, and telecommunications electronics materials protected from emanating spurious transmissions
What are the information assurance aspects when it comes to the defenders operation in physical level.
- COMPSEC
- COMSEC
- ITSEC
- OPSEC
Meaning of COMPSEC
Computer Security
Meaning of COMSEC
Communication and Network Security
Meaning of ITSEC
The Information Technology Security Evaluation Criteria
(which includes both COMPSEC and COMSEC)