Security and Risk Management Flashcards

1
Q

CIA Triad

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Concepts of Confidentiality

A

Sensitivity- Quality of information
Discretion- Influence or control disclosure to minimize harm or damage
Criticality- Level of mission criticality
Concealment- Hiding or preventing disclosure
Secrecy- Maintaining a secret or preventing disclosure
Privacy- Keeping information confidential that is PII or that might cause harm, embarrassment, or disgrace to the individual
Seclusion- Storing data in out-of-way location
Isolation- Keeping information separated from others, prevents commingling of data and disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 Elements of AAA Service

A

Identification- Claiming an identity
Authentication- Proving you are identity
Authorization- Defining allows and denials of resource and object access for identity
Auditing- Recording log of events for subject or object
Accounting- Reviewing log files to check for compliance and violations to hold accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AAA Leads To

A

Nonrepudation- Subject cannot resort to denial. Established using digital certificates, session identifiers, transaction logs, access control mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protection Mechanisms

A

Common characteristics of security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layering

A

Defense in depth- Use of multiple controls in a series. Liner/Layer is better than parallel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Abstraction

A

Similar elements are put into groups, classes, and roles that are assigned security controls, restrictions, permissions as a collective. Subject Roles/Object Classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Hiding

A

Preventing data from being discovered or accessed by a subject by positioning data in a logical storage compartment that is unseen by the subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption

A

Art/science of hiding meaning or intent of communication from unintended recipients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Governance

A

Collection of practices related to supporting, defining, and directing the organizational security efforts. Equates to Corporate/IT Governance. Implementation of a security solution and management method that are tightly connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Management

A

Responsibility of upper management, not IT staff. Considered a business operation. Team responsible is autonomous. Security Plan MUST be approved by senior management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Management Planning

A

Ensures proper creation, implementation, and enforcement of a security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Top Down Approach

A

Must be used. Begins with Senior Management and ends with Users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Management Plans

A

Strategic, Tactical, Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Strategic Plans

A

Long term plan/stable. Defines organizational security purpose. Useful for 5 years if updated annually. Should include Risk Assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tactical Plans

A

Midterm plan that provides more details on goals of strategic plan. Useful for 1 year. Includes project plans, acquisition plans, hiring plans, budget, maintenance, etc.

17
Q

Operational Plans

A

Short term, highly detailed plan. Must be updated monthly or quarterly. Includes resource allotments, budget requirements, staffing assignments, scheduling, and procedures.

18
Q

Change Management

A

Goal- to ensure any change does not compromise security. Purpose- to make changes subject to documentation and auditing and thus have it approved/scrutinized by senior management

19
Q

Change Advisory Board

A

Reviews and approves all changes

20
Q

Data Classification

A

Primary means by which data is protected based on its need for secrecy, sensitivity, or confidentiality

21
Q

Data Classification Basis

A

Usefulness, timeliness, value, cost, age, lifetime, storage, national security implications, who has access, who does not have access, disclosure/damage assessment.

22
Q

Declassification

A

Required once asset no longer warrants or needs protection of classification level

23
Q

Two Classification Schemes

A

Government/military and commercial business/private sector

24
Q

Government classification

A

Top-secret, secret, confidential, unclassified.

Top secret: unauthorized disclosure will have drastic effects and cause grave damage