Question set 1 Flashcards
- What is the CISSP Triad?
-CIA = 1. Confidentiality 2. Integrity 3. Availability
- Definition of Confidentiality
Ensures that information is not compromised or shared amongst unauthorized participants
- Definition of Integrity
Ensures that data is not damaged or modified while either in transit or storage
- Definition of Availability
Ensures that information is always available at the time authorized users need it
- What are the 3 times data is secured?
- In storage 2. In process 3. In transit
- General categories of controls
Administrative, technical, and physical
- Types of controls
Preventative, Deterrent, Corrective, Recovery, Detective, Directive, Compensation
- Preventative control
stop attack before beginning. Ex: firewalls, fence
- Deterrent control
discourage someone from trying. Ex: warning sign
- Corrective control
attack begins, but stops before damage occurs
- Recovery control
attack happens and causes damage, but control reverses damage
- Detective control
-detects attack but doesn’t do anything about attack
- Directive control
procedures to follow. Normally an administrative control
- Compensation control
No real control, but reaction after attack happens. Ex: insurance, lawyers
- What are some good operation security practices?
-separation of duties, job rotation, need to know, least privilege, personnel security, mandatory vacations, job action warnings or termination
- Separation of Duties
- Application of the principle of least privilege on administrative accounts
- Ensures one person cannot compromise an organization’s security
- Job rotation
- more than one person fulfills task or position
- small group of cross-trained employees who switch jobs and access settings every 3 to 6 months
- Need to know
- Individuals should only have access to information they need to know in order to do their job
- tied to least privilege
- Principle of least privilege
-individuals should have just enough access to do the task at hand and nothing more
- Due Diligence and Due Care
- Due Diligence=Do Detect
- Due Care=Do Correct
- Accountability
- Link processes/users to certain actions
- prohibit shared accounts
- Functions of change management
- Ensure change is implemented in orderly manner
- Analyze effect of the change
- Reduce negative impact
- Clipping Levels
- number of permitted failures before locking out
- errors below clipping level are ignored or considered par for the course or normal
- Data remanence
- data left on media after the media has been erased or cleaned
- Trusted recovery
- occurs when the system detects an unsafe, unstable, or insecure state
- blue screen is a good example