Overview Flashcards
What is “the protection of information assets by addressing threats to information processed, stored and transported by internetworked information systems.” ?
cybersecurity
What are attacks by an adversary who possesses sophisticated levels of expertise and significant resources, which allow the attacker to create opportunities to achieve its objectives using multiple attack vectors.
Advanced Persistent Threats (APTs),
What are some of the factors (6) that can impact security, such as:
- Platforms and tools used
- Network connectivity (internal, third-party, public)
- Level of IT complexity
- Operational support for security
- User community and capabilities
- New or emerging security tools
When evaluating business plans and the general business environment, consider drivers (7) such as:
- Nature of business
- Risk tolerance
- Security profile
- Industry trends for security
- Mergers, acquisitions and partnerships
- Consider type, frequency & level of integration
- Outsourcing services or providers
Cybersecurity addresses both internal and external threats to an organization’s digital information assets by focusing on what (4)?
critical electronic data processes,
signal processing,
risk analytics and
information system security engineering.
Estimated information security jobs available are expected by 2018
over 4.2 million
Information security deals with information, regardless of its format—it encompasses paper documents, digital and intellectual property in people’s minds, and verbal or visual communications. Cybersecurity, on the other hand, is concerned with protecting _________
digital assets
What does ENISA stand for?
European Union Agency for Network and Information Security
NIST and ENISA have identified five key functions necessary for the protection of digital assets:
- Identify: Use organizational understanding to minimize risk to systems, assets, data and capabilities.
- Protect: Design safeguards to limit the impact of potential events on critical services and infrastructure.
- Detect: Implement activities to identify the occurrence of a cybersecurity event.
- Respond: Take appropriate action after learning of a security event.
- Recover: Plan for resilience and the timely repair of compromised capabilities and services.
To better understand cybersecurity and the protection of cyberassets, it is helpful to consider three key
concepts that are used to guide security policies. The concepts are:
- Confidentiality - protection of information from unauthorized access or disclosure.
- Integrity - protection of information from unauthorized modification.
- Availability - ensures the timely and reliable access to and use of information and systems.
Confidentiality can be preserved using the following methods:
- Access Controls
- File Permissions
- Encryption
Integrity can be preserved using the following methods:
- Access controls
- Logging
- Digital Signatures
- Hashes
- Encryptions
Availability can be preserved using the following methods:
- Redundancy
- Backups
- Access Controls
Nonrepudiation refers to the concept that a message or other piece of information is _______.
genuine.
Nonrepudiation is implemented through _______.
1) transactional logs and
2) digital signatures.