Security And Risk Management (ch 1-4) Flashcards
What is the CIA Triad
Confidentiality- the principle that objects are not disclosed to unauthorized subjects
Integrity- the principle that objects retain their veracity and are only modified by authorized subjects
Availability- the principle that authorized subjects are granted timely and uninterrupted access to objects
Explain how identification works
Identification is the process by which a subject professes an identity and accountability is initiated
Understand the process of authentication
Authentication is the process of verifying or testing that a claimed identity is valid. Authentication requires information from the subject that must exactly correspond to the identity indicated
How does authorization fit into a security plan
Authorization ensures that the requested activity or object access is possible given the rights and privileges assigned to the authenticated identity
What is security governance
The collection of practices related to supporting, defining, and directing the security efforts of an organization
Explain the auditing process
Auditing or monitoring is the programmatic means by which an authenticated subject is held responsible for their actions on a system. It detects unauthorized or abnormal activities
What are the steps of the Business Impact Assessment process?
Identification of Priorities Risk Identification Likelihood Assessment Impact Assessment Resource Prioritization
What law makes it a crime to cause malicious damage to a “federal interest” computer?
Computer Fraud and Abuse Act
What type of intellectual property protection is best suited for computer software?
Trade secret
Which one of the following BCP phases involves the largest commitment of hardware and software resources?
The BCP implementation phase involves the largest commitment of hardware and software resources. The other phases are more manpower intensive.
A host organization that houses on-site security staff has what form of security system?
Proprietary system: This is the same thing as a central station system; however, the host organization has its own on-site security staff waiting to respond to security breaches.
Under what form of control are people and processes all included, managed, and controlled?
Administrative control takes into consideration the processes and people who operate within an organizational security policy.