Mindset Goals Challenges Flashcards
Security
The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resource; multilayered multifaceted concept.
C.I.A. Triad
Confidentiality, integrity, and availability, a well-known, venerable model for the development of security policies used in identifying problem areas, along with necessary solutions in the arena of information security. Primary security goals
Confidentiality
avoidance of the unauthorized disclosure of information; access control lists, encryption; privacy
Integrity
The property that information has not be altered in an unauthorized way. Designed to protect data from deletion or modification from any unauthorized party; use version control, access control, security control, data logs and checksums.
Availability
The property that information is accessible and modifiable in a timely fashion by those authorized to do so
Means to Managing Confidentiality
Access control lists, volume and file encryption, and Unix file permissions.
Security Challenges
Not easy. Have to forward think of potential attacks. Hackers only need fine one weakness vs. developers need to guard all; battle of wits.
Security Challenges with User & System Designers
They sometimes don’t see the benefits until attack occurs; an afterthought
Security Challenges w/Monitoring
Requires constant monitoring; expensive; consider security investment w/little value
Security Challenges w/Usability
Thought of as an interference with usability. May involve additional algorithms; procedures to provide some services maybe counterintuitive.
Security Challenges w/security Mechanisms
Involve more than one particular algorithm and/or information–question can be raised about creation, distribution, and protection of these.
A.A.A.
is a method you can use in your network to control which administrators are allowed to connect to which devices (authentication), what they can do on these devices (authorization), and log what they actually did while they were logged in (accounting).
Authenticity
the ability to determine that statements, policies, and permissions issued by persons or systems are genuine
Non-repudiation
Is the ability to guarantee that someone cannot deny something
Assurance
how trust is provided and managed in computer system