Security Flashcards
Describe the confidentiality component of security
Providing protection from unauthorised access or disclosure
What are the three components of security?
Confidentiality
Integrity
Availability
Describe the integrity component of security
Ensuring that systems and information are complete and free from unauthorised change or modification
Describe the availability component of security
Ensuring that information, services and resources are available when and where required
Security should be regarded as a horizontal / vertical component within an organisational structure
Horizontal
What is the concept of “defence in depth”?
The idea of a series of overlapping protective measures embracing the whole organisation. Each of the controls may be cheap and not necessarily particularly strong, but taken together they integrate to form a total solution.
List some of the component controls of “defence in depth”
Physical security Policies and procedures Personnel security Organisational culture Clear desk policy Document security Audit trails Business continuity
In terms of security, why is it not advisable to rely on one control?
It creates a single point of failure
In defining the controls required in a security system, what three points should be taken into consideration?
- Security is a management issue not an information technology issue
- The controls put in place should not interfere with legitimate business processes
- Users may need to be made aware what the controls are designed to achieve, and trained to maximise the potential effect of the controls
Physical security: what is the first defensive point of any organisation?
The perimeter
Personnel security: what supplements a physical control quite well?
If staff have to show ID on entering the building
Backups. At a minimum, how often should smaller organisations perform backups?
Backup of whole system once a week
Backup of data only, daily
Where should backups be stored?
Off-site
What risk do backups pose in terms of security?
Whereas the original data may be password controlled, the backup may not be protected
With regard to application security, what five controls should be considered to minimise the risk of corruption of operational systems?
Updating operational program libraries should only be performed by the nominated librarian upon management authorisation
If possible, operational systems should only hold executable code
Executable code should not be implemented on an operational system until evidence of successful testing and UAT is obtained
Audit log should be maintained of all updates to operational program libraries
Previous versions of software should be retained as a contingency measure