Module 1 Flashcards

1.1: Analyze the current landscape of information assurance and computer security. 1.2: Evaluate trends in information assurance and computer security. 1.3: Determine the importance of security in the IT industry and its impacts across other fields. 1.4: Execute security principles and strategies. 1.5: Analyze security principles and strategies. 1.6: List bad security practices that are commonly observed in daily life. 1.7: Explain which security principles bad practices are breaking

1
Q

What are the challenges of Cyber Security?

A

System availability, data integrity, and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information Assurance?

A

An application that encompasses scientific, technical, and management disciplines that are required to ensure information security and quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the forms of information?

A

Hard copy, soft copy, records of meetings, telephone conversations, video conferences, and personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the states of information?

A

Transmitted, Processed, and stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the components of information security?

A

Confidentiality, Integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s a threat?

A

A potential occurrence that can have undesirable effect on system assets or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the threat categories?

A

Disclosure, Deception, Disruption, and Usurpation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is vulnerability?

A

a weakness that makes it possible for a threat to occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the Information Characteristics?

A

Authentication, Non-repudiation, secrecy, and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Authentication?

A

Validity of transmission, message, originator, or means of verifying an individuals means of authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is Non-repudiation

A

Assurance that sender of data is provided with proof of delivery to recipient, and recipient is provided with proof of sender Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is Secrecy?

A

Cryptography and computer access control. Limits the number of principals who can access information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is Privacy?

A

The ability/right to protect private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is confidentiality?

A

Determines the secrecy of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the confidentiality principles

A
  1. need to know
  2. data sep
  3. compartmentalization
  4. classification
  5. encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the weakest link?

A

Security is only as strong as the weakest link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the security strategies

A

obscurity, perimeter defence, defence in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Defence in depth

A

A number of IA layers of defence that are operationally interoperable an complementary technical and non-technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

enclave

A

an env under control of a single authority with personal and physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is the make up of defence in depth?

A

1.perimeter def around each enclave
2. multiple complicated connections between an enclave and outside
3. multiple layers and a diff solution req for each connection

21
Q

What is the general layered arch model for defence in depth?

A

layer 1: IA policies
layer 2: IA management
layer 3: AI architecture (Technical IA infrast)
layer 4-10: non-technical implementation

22
Q

what does layer 3 in layered arch model ensure?

A

ensures the minimal level of interoperability and services are available to authorized users.

23
Q

How many and what types of levels of security does layer 3 implement?

A
  1. physical ,procedural, and logical security
24
Q

what is L4 in layered arch model

A

operational security administration

25
Q

what is L5 in layered arch model

A

config management

26
Q

what is L6 in layered arch model

A

life-cycle security

27
Q

what is L7 in layered arch model

A

contingency planning

28
Q

what is L8 in layered arch model

A

IA education/training

29
Q

what is L9 in layered arch model

A

policy compliance oversight

30
Q

what is L10 in layered arch model

A

IA incident responce and reporting

31
Q

what is mission assurance?

A

to identify and mitigate design, prod, test, and field support deficiencies

32
Q

how does the conflication between IA an mission assurance be averted?

A
  1. by protecting the infra and data
  2. securely sharing information with auth individuals
33
Q

what is MAC?

A

mission assurance categories

34
Q

what is Mac 1?

A

systems that handle infor most critical to operations

35
Q

what is Mac 2?

A

systems that handle info that supports most critical operations- loss can be tolerated

36
Q

what is Mac 3?

A

infor that is necessary for day to day operations

37
Q

what is risk?

A

something that may happen in the future

38
Q

what are the vulnerability categories?

A

design, implementation, and deployment

39
Q

what are design vulnerabilities?

A

flaws in logic
-most difficult to identify b/c they require clear understanding of material

40
Q

what are implementation vulnerabilities

A

incorrectly handled unexpected inputs

41
Q

what are deployment vulnerabilities

A

incorrect or faulty deployments of application (i.e weak passwords)

42
Q

what is risk management?

A

dealing with risks in cost effective manner- rather than avoiding risks at all costs

43
Q

what are the 3 risk choices?

A

Acceptance, reduction, and transfer

44
Q

What is IA policy?

A

High level statements of goals of procedures for information assurance

45
Q

What are the IA policy enforcement mechanisms?

A

Inform/explain/document
technical
procedural (security auditing)

46
Q

What is a security policy

A

A statment that partitions the states of the system into a set of auth/secure and unath/insecure states

47
Q

Do IA policies include security policies/

48
Q

How to establish IA policies?

A
  1. secure strong management support
  2. gather key data
  3. define framework
  4. structure procedures
  5. perform risk assessment