Module 1: Security and Risk Management Flashcards
What are the primary goals and objectives of a security infrastructure?
CIA Triad
Confidentiality: measures used to ensure protection of secrecy of data, objects, resources.
Integrity: protecting reliability and correctness of data
Availability: authorized subjects are granted timely and uninterrupted access to objects.
What is the goal of Confidentiality protection?
The goal of Confidentiality is to prevent or minimize unauthorized access to data.
Give examples of Countermeasures that can be used to protect Confidentiality agianst possible threats
- encryption
- strict access control
- rigorous authentication procedures
- data classification
- extensive personnel training
- network traffic padding
List the concepts of Criticality
- Sensitivity: Quality of Information
- Discretion: Act of decision of operator
- Criticality: Level of mission critical
- Concealment: hiding to prevent disclosure
- Secrecy: Keeping something secret
- Privacy: Personally Identifiable information
- Seclusion: Storing out of the way
- Isolation: Keep separate from others
What is the primary goal of Integrity in the CIA triad?
- Protecting reliabilty and correctness of data
- Allow for authorized changes while protecting against unintended and malicious changes.
List and describe the main concepts related to Integrity?
- Accuracy: Is the Data correct and precise?
- Accountability: A person is responsible for the data, action, or result
- Truthfulness: True reflection of reality
- Validity: Being factual and logically sound
- Completeness: Having everything needed for the result
- Responsibility:Control of the data and that has been defined
- Comprehensiveness:Is all the data included and does it have all the necessary parts for the scope
What is the primary goal of Availaibity in the CIA triad?
Authorized subjects are granted timely and uninterupted access (be available when needed)
List and describe the main concepts of Availabilty
- Usability: How easy it is to use, learn, understood by a person
- Accessabilty: How easy or hard to manage
- Timeliness: Prompt, on time, or within a reasonable time for recovery
Provide examples of Threats to Integrity
- Virus and logic bombs
- Errors in coding and applications
- Intentional replacement
- System backdoors
Provide some examples of threats to Availabilty
- Device failure
- Software errors
- Environmental issues
- DoS attacks
- Communicatation interruptions
Provide some examples of threats to Confidentiality
- Human error, oversite, ineptitude
- Intentional attacks (man in the middle)
- Misconfiguration
List some Countermeasures to ensure confidentiality against possible threats.
- Encryption
- Network traffict padding
- strict access control
- rigorous authentication procedures
- data classification
- extensive user training
List some countermeasures that ensure integrity against possible threats
- strict accdess control
- rigorous authenitcaion procedures
- intrusion detection systems (IDS)
- data encryption
- has verification
- input function checks
- extensive personnel training
List some countermeasures that can ensure availability against possible threats
- desinging intermediary delivery systems properly
- using access controls effecgtively
- monitoring performance and network traffic
- using firewalls and routers to prevent DoS attacks
- implementing reduncancy for crytical systems
- Maintaining testing and backup systems
What are the failures of security protections in the CIA Triad (DAD)
- Disclosure (Confidentiality)
- Alteration (Integrity)
- Distruction (Availabilty)