Risk Management Lecture 3 Flashcards
What are the 3 main objectives of information security?
Confidentiality
Integrity
Availability
How are the 3 Objectives in information Security Balanced?
Confidentiality - Integrity - Availablity
Depending on scenario, these 3 objectives are not balanced evenly.
For example, if enforcing 100% confidentiality put a stress on doing business negatively.
In Regards to confidentiality, what does this entail?
Confidentiality measures protect information from unauthorized access and misuse.
Examples:
Encryption of data (stored and sent)
Data loss prevention
User Awareness
Non-disclosure policies
Logical Access Controls ie. No point for low lvl employees to have access to absolutely all company data
In Regards to Integrity, what does this entail?
Integrity measures protect information from unauthorized alteration.
Examples
- Hashing and digital signing
- Configuration and change management
- Access Controls
Eg limiting access to certain users as read-only to ensure they cannot modify the data
In Regards to Availability, what does this entail?
In order for an information system to be useful it must be available to authorized users. Availability measures protect timely and uninterrupted access to the system. Example: - Architecture/system design with redundancy built-in ○ RAID ○ Clustering ○ Load Balancing ○ Fail-over design ○ Data backups ○ Dual power supplies
What are the 3 categories of Control functionalities in information Security?
- Preventive Control
a. Stop incidents from occuring
i. Eg Only Granting Read access to data entry employees- Detective Control
a. Identify incidents starting/during
i. Eg. User copying lots of information off the database off site - Corrective Control
a. Fix issues after incidents
Eg. Restoring a previous backup after hardrive failure
- Detective Control
In information security, what is a Control that emphasizes stopping incidents from occurring?
Preventive Control
In information security, what is a Control that enphasizes detecting incidents starting/during issues?
Detective Control
In information security, what is a Control that emphasizes fixing issues after incidents?
Corrective Control
What are the core Principles for managing InfoSec?
- Defense in depth
a. Do not rely on single defense mechanism, its better to have numerous ones. - Segregation of duties
a. Avoid stacking tasks on individuals for risk reduction purposes
i. Eg. Putting a manager in charge of auditing their own expenditures - Minimum Privilege
a. Restrict physical Access to resources
b. Restrict Logical assess to computers/networks
c. Base control decisions on least privilege
i. Individuals should only be granted minimum access to resources that they require to complete their job - Need To Know
a. Information only provided when necessarily for business functions
i. Eg. No point for a janitor to know what the computers do in the rooms they’re cleaning - Avoid “Security by Obscurity”
Having a key pad entry into a room with a post it note nearby with the code is probably not a good security mechanism
Of The Core Principles for managing infosec what does Defense in depth mean?
The Principle of Defense in depth is to not rely on a single point of defense, always have numerous lines of defense.
Of The Core Principles for managing infosec what does Segregation of duties mean?
Avoid stacking duties/tasks on individuals/small departments to reduce risk.
An example of risk would be putting a manager in charge of auditing their own expenditures.
Of The Core Principles for managing infosec what does Minimum Privleges mean?
Individuals should only be granted minimum access to resources that they require to complete their job
Also
a. Restrict physical Access to resources
b. Restrict Logical assess to computers/networks
c. Base control decisions on least privilege
Of The Core Principles for managing infosec what does Need to know mean?
a. Information only provided when necessarily for business functions
Eg. No point for a janitor to know what the computers do in the rooms they’re cleaning
Of The Core Principles for managing infosec what does “Avoid Security by obscurity” Mean?
Trying to hide bad security does not make for good security.
Hiding a key to your front door under a floor mat at your front door for example.