Security Flashcards
Availability
Ensures the accessibility of data to users who should have access to it.
Threats to this can be accidental, such as someone accidentally deleting a file of unplugging a server, or even a natural disaster. Always have had measures in place to protect data from these events.
In Last Decade:
Deliberate Attacks called “denial of service” that attack Availability. engages a virus to use other comps to access a website and overwhelm it with traffic so actual users can’t use the site
Threats can also be deliberate, such as attacks which block access to legitimate users by overwhelming a server, viruses, etc.
Now security must be able to keep websites running in the face of these attacks.
Threat and Risk Management
Practice of Identifying security problems (from an attack or accident), Prioritizing risks based on their likelihood of occurring and potential for damage, Identifying means by which a risk may be mitigated or avoided.
Risk
possibility of something happening either good or bad
Threat Mitigation
focus of security
Risk Categories
Risk Avoidance, Acceptance, Mitigation, Transfer, Residual Risk
Risk Avoidance
Actions to prevent a potential event from happening
e.g. backup generators for power outage
Risk Acceptance
When you decide to not do anything about the risk.
possibility is remote, or too expensive.
Risk Mitigation
a plan put in place to MINIMIZE the impact of an event.
May not be much to avoid risk but can be mitigated; i.e. for flooding (can’t be prevented but can prepare for it) have a backup location with servers.
Risk Transfer
when you move responsibility for the event to someone better-equipped to handle it.
Let a specialist take care of handling the risk, let them set up the plan of action.
Residual Risk
the risk that still remains even after you’ve done one or more of these actions.
PoLP (Principle of Least Privilege)
Idea you can access comp resources using an identity that has the absolute minimum permissions to do what you need and nothing more.
In reality, we tend to have accounts with more privileges than we need at the given moment for the task we are completing because we may have many tasks to complete in the day and having a separate account limited to permissions for each task is not practical. Therefore, PoLP can be difficult to implement in detail and no one wants dozens of user accounts.
PoLp prevents…
makes it less likely that you will accidentally damage something or that malware will “piggyback” on your access to do damage.
One of the most important principles of security
Principle of Least Privilege
How to get around difficulty of implementing PoLP
Can tier out PoLP to create general categories of Least Privilege
Ways to Implement PoLP
Groups,
Administrators,
Standardization,
Third-Party Applications