Security Governance Flashcards
What are the three parts of the CIA triad ?
Confidentiality, Integrity and Availability
What is the Confidentiality part of the CIA Triad ?
Ensures sensitive information is only seen by authorised users.
What are the three controls that ensure confidentiality ?
Encryption, Access Controls, Steganography
What are the eight most common attacks that breech Confidentiality ?
Sniffing, Shoulder Surfing, Stealing Password files, Capturing Network Traffic, Social Engineering, Port Scanning, Eavesdropping and Escalation of Privileges
What are the six countermeasures to ensure confidentiality ?
Encryption, Network Traffic Padding, Strong Access Control, Strict authentication procedures, Data classification, Personnel Training
What are the four components of Confidentiality ?
Sensitivity, Discretion, Criticality, Concealment, Secrecy, Privacy, Seclusion, Isolation
What is the Integrity part of the CIA triad ?
Refers to the prevention of unauthorised alterations to the data.
Integrity ensures that data is _ _ _
Unaltered, Preserved Correct
Besides encryption what other counter measures can be used to preserve integrity ?
Hashing
What is the availability part of the CIA triad ?
Ensuring that resources are available to access whenever those authorised to do so need to.
What are the three most common threats to availability ?
DOS, Human Error, Natural Disaster
Name three common countermeasures for availability attacks
DOS mitigation and load balancers, backups and high fault tolerance
What is identification ?
The process by which an individual submits proof of their identity to the system.
What is authentication ?
The process by which the system checks and verifies the provided identity.
What is authorisation ?
The set of permissions given to a user of the system
What is auditing ?
Tracking and recording user activity to find out any anomalies in behaviour.
What is the difference between monitoring and auditing ?
Monitoring doesnt record unlike auditing
What is accounting ?
Linking user activity to identity
What is threat modelling ?
Identifying all possible threats to a system so that they can be categorized and analyzed
What does the phrase threat modelling is proactive mean ?
You are attempting to find and fix issue before they arise.