Part 2 Flashcards
What are the security planning principles?
1) Risk Analysis
2) Comprehensive security
3) Defense in Depth
What is Risk Analysis?
The process of balancing threat and protection costs for individual assets.
Annual cost of protection should not exceed the expected annual damage. Goal is not to eliminate risk but to reduce it to an economically rational level
What does comprehensive security mean?
Comprehensive security means closing off all avenues of attack
Attackers only has to find one weaknesses to succeed. Therefore, we need to cover all bases
What does defense in depth mean?
Defense in depth means having several layers of defense.
Such that if one protection layer breaks down, the attack will not succeed.
What are the 2 aspects of cyber security?
Technical and Managerial
What is the focus of the technical aspect of cyber security?
The main focus is on developing technical expertise and technologies for computer security. These include: encryption techniques, firewalls, biometric-based security technologies
What is the focus of the managerial aspect of cyber security?
The main focus is on developing security policies and procedures. These include: policies and mechanisms, operational issues and human issues.
What does cyber security implementation rely on?
Process, Technology and People
Process: Policies must be developed, communicated, maintained and enforced. Processes must be developed that show how policies will be implemented.
Technology: Systems must be built to technically adhere to policy.
People: People must understand their responsibilities regarding policy
What are policies?
Policies are statements of **what **should be done under specific circumstances.
Why do policies need to be acceptable to users?
If policies are not acceptable (sensible) then users will ignore and bypass it, which will be dangerous.
Why is implementation important?
Implementation helps to make sense of policies in the local context with local and technical expertise.
What are the 2 forms of implementation guidance?
Standards and Guidelines
Distinguish Standards and Guidelines
Standards are mandatory but guidelines are discretionary - optional but must be considered carefully.
Why is oversight important in policy-based security?
Oversight checks that policies are being implemented successfully. It may uncover implementation problems or problems with the specification of the policy.
Oversight staff are separate from implementers. Policies are given to implementers and oversight staff independently.
What are the different ways of oversight in policy-based security?
1) Auditing
2) Log files
3) Vulnerability analysis