Lesson 10 Flashcards
Name the CIA Triad
Confidentiality
Integrity
Availability
Confidentiality
Keeping information private and protecting it from unauthorized use
What are some things that maybe confidential
Trade Secrets
Personnel Records
Tax Records
Military Secrets
Integrity
Keeping information accurate, free from errors, and unauthorized modifications
Availability
Making sure that the resources are available for use by end users
How to ensure Integrity
Encryption
Hashing
How to ensure Availability
SANS
Redundancy
What are the four security factors that most systems rely on
Authorization
Access Control
Accountability
Auditing
Authorization
determining what rights and privileges an entity has
Access Control
assigning privileges to various resources, objects or data
Accountability
Who to hold responsible for a particular activity or even such as a logon
Auditing
process of tracking and recording system activities and resources
Non repudiation
goal of ensuring that data remains associated with the party that creates it or send a transmission with the data
Least Privilege
users or software have only the minimal level of access that is necessary for them to perform their duties
Privilege Bracketing
to allow privileges only when needed and then revoke them as soon as the user finishes the task or the need has passed
Risk
a concept that indicates exposure to the chance of damage or loss.
Likelihood of a hazard or threat occurring.
Risk is often associated with
The loss of power
Loss of a device
Loss of the network
Other physical loss
A disgruntled employee is a threat or vulnerability
Threat
What is the determining factor when looking at information system security
Risk
Unauthorized access
network of data access that is not explicitly approved by an organization
Name some acts of unauthorized access
Attack by an outsider
Misuse of privileges
Inadvertent actions
Does Unauthorized access result in data loss or damage
No
Can unauthorized access lead to network attacks
Yes
Data Breach
Sensitive or protected data is copied transmitted viewed stolen or used by individuals unauthorized to do so
Attacker
Malicious intruder
Hacker
Possess skills to gain access to computers
Security controls
safeguards to avoid counteract minimize security risks relating to personal or organizational property
Name some physical controls
Fences
doors
locks
fire extinguisher
Name some procedural controls
incident response process
management oversight
security awareness
training
Name some technical controls
authentication
logical access
antivirus
firewalls
Name some legal and regulatory compliance controls
Privacy laws
Policies
Clauses
Security policy
statement that defines how security will be implemented within an organization
This describes the means that the organization will take to protect the CIA of data and resources
Security Policy
What determines the security policy
needs of the organization
Without a formal policy you can only
react to threats instead of anticipating them
Which policy may include a consent to monitor clause
Security Policy
Consent to monitor banner normally states
You agree to be monitored
You are authorized to access or download specific data
You and the network owners have a reasonable expectation of privacy
You consent to reasonable law enforcement searches
What are the components of a Security policy
Policy Statement
Standards
Guidelines
Procedures
What outlines the plan for the individual security component
Policy Statement
Defines how to measure the level of adherence to he policy
Standards
Suggestions recommendation or best practices for how to meet the policy standard
Guidelines
Step[ by step instructions that detail how to implement
Procedures
Name some common security policy types
Acceptable Use Policy
Audit Policy
‘Extranet Policy
Password Policy
Wireless Standards Policy
Name a Security Policy Standards Org
SANS
pg 258
pg 258
What are windows security policies
configuration settings within windows
Where are windows security policies found
in a policy object in the computer configuration\windows settings\security settings node
Group policies cab be applied to single devices or users, to groups of devices or users, to all devices or users
True
Group Policy
centralized account mgmt. for AD
Permissions
security setting that determines the level of access a user or group account hat to a resource
What are somethings that may have permissions
printers
files
shared folders
directory databases
Is it a good practice to assign rights and permissions to individual accts
NO
It is better to create group policies