Security Concepts Flashcards
New Topic: Ethics
Ethic is set of moral principles
Code of Ethics (COE)
Principles of professional conduct, . AS ISC2 members are required to commit fully to the COE
Violation of COE
Subject to peer review panel and revocation of Certificate. Failure of COE is breach of code Canon IV
Canon means
Values
Canons in Practice are
PAPA: Protect everything you are responsible for , Act with good intentions . Provide your best efforts, Advance your knowledge skills
Protect the Society
SAfeguard information and systems
Consider societal impact
Do your best
Thoroughky analyze policies
Provide or recommend
Act Honorably
Any leakages, dont lose integrity. If a mistake is made then take ownership.Lead by example
Provide diligent and competent service
Be good at your job, by staying up to date with current technology services
Advance and protect profession
Growth and maturity of Cyber Security practices
Share knowledge, mentoring
Keep on current threats, vulnerabilities and attacks
Summary of Cannons
Understand the importance of integrity and accountability in ethical decision making
New Topic: Information Security Concepts
CIA =
Confidentiality - Can the data be given to unauthorised persons
Integrity - Can these users change the data
Availabilty - How quickly the data need to be made available
Confidentiality
Can all users see all of the data? Who can?
Can this data be release outside of the company?
How do we protect data from unauthorised access?
Integrity
Who can change data in these file?
Can all users change update all of the data?
How does the file need to be protected from unauthorised changes?
Availability
How important is this data to the company?
Does it need to be made available quickly or can it be stored somewhere safe?
How do we make sure data can be used when its needed?
Authenticity
Data , action coming from legitimate subject. Don’t need a proof of this. E.g. Login. Username and password. Authenticity can be spoofed or maligned.
Non Repudiation
Data actions originated from a specific subject but cannot be disputed. If some one makes a change to data and they cannot dispute it. Its done by cryptography. Digital Signatures.
New Topic: Security and the Organisation
Security Goverance
Security Governance?
Defines Aligning ethically the business objectives to laws, regulations and standards
what does security must not impact?
Business Processes
What should security must support in an organisation?
1- Business objectives
2- Standards
3- principles and strategies of organisation
Who should be supporting security?
Senior Management buy-in is essential
What processes in an organisation security must account for?
1- System development
2- Change Management
3- Software development
4- DevOps
5-Operations
What is Top Down approach in Security?
1- Senior Management - Set the vision, Define policies for security
2- Middle Management - Document Artefacts, standards
3- All other personnel - Work on the implementation of security standards
What is Security Planning and what are the different plans?
Strategic plan - 3-5 years
Tactical plan - 1 year (e.g. migrating a local IS to a Cloud based )
Operational plan - 1-3 months (e.g. migration project)