Security Governance Flashcards
What is the CIA triad ?
CIA are the primary goals and objectives of a security infrastructure. Security controls are evaluated how well they address these three core principal
What is the concept of Confidentiality in the CIA triad ?
This is a concept of the measures to ensure the protection of the secrecy of data objects and resources.
What controls are aimed at providing Confidentiality ?
Encryption
Access Controls
Steganography
Is Confidentiality always breeched through intentional acts ?
No it can be breeched by accident or incompetence and carelessness such as leaving documents on a printer
In the CIA triad what is the concept of subject and object ?
A subject is Active element in a security relationship such as users, programs and computers which acts upon the object which could be a database, filesystem or another person
What are the 8 related concepts to confidentiality ?
Isolation,
Sensitivity,
Discretion,
Criticality,
Concealment,
Secrecy,
Privacy,
Seclusion
What are the treats to Confidentiality ?
Threats to encryption (cryptanalysis)
Social Engineering
Key Loggers
IOT
What are the three modes of data involved with Confidentiality ?
- Data at rest - Encryption
- Data in transit - TLS, IPSEC,SSL
- Data in Use - Clean desk policy & PC Locking
What are the common attacks on Integrity ?
- Cryptanalysis
- Code Injections
- Alteration of Data
What are some of the protections for Integrity ?
- Hashing
- Encryption
- Digital Signatures
- Checksums
- Access Control
What are the common threats to Availability ?
- Malicious attacks (DDOS, physical attack)
- Application (Malicious or bad code)
- Hardware Failure
What are some of the measure to stop attacks on availability ?
- IPS/IDS
- SLA
- Patch Management
- Redundancy and High Availability measures
What is the opposite of the CIA triad ?
Disclosure, Destruction, Alteration
What is happening that brings about the DAD scenario ?
Disclosure, Alteration and Destruction are symptoms of the mix between CIA being incorrect
What is identification ?
It is something that uniquely identifies you such as a username or a social security number
Does just claiming identity imply access or authority ?
No
What are the three types of authentication ?
Type 1 - Something you know such as a password
Type 2 - Something you have which is a MFA token
Type 3 - Something you are such as Biometric
What is authorisation ?
Determines what you can access ?
What are the four most common types of access control ?
Discretionary
Mandatory
Role Based
Accountability Based
What is accountability ?
The ability to trace an action to a subjects identity
Give an example of an action that helps accountability/auditing ?
Log files
What is the difference between monitoring and auditing ?
Monitoring is a type of watching or oversight whereas auditing is a recording of information to a record or a file
Why is accountability important ?
If you are unable to legally support your security and support non repudiation with accountability then it may be difficult to prove malicious intent
Whats the difference between discretionary and mandatory access control ?
Discretionary gives you more permissions that you strictly need i.e. there is some discretion where as mandatory is the exact access permissions that you need and no more
In Security what is the need to know principle ?
Even if you have access if you dont have a reason then you should not access the data
What is the difference between governance and management ?
Governance is a enterprise led vision and direction undertaken by company owners, board members etc and shows where the organisation wants to go whereas management is how to get there and is implemented by managers and team leads
Does the governance or management function determine an organisations risk appetite ?
Governance
What is risk tolerance ?
It is the how we are going to work with our environments and risk appetite
What are the typical six c - level executive roles responsible for governance ?
- CISO
- CTO
- CEO
- CIO
- CFO
- CSO
Why must CISO and CEO function report independently of the IT function ?
To ensure independence
What is PCI-DSS
A required standard for the credit card payments industry
What is Octave
Operationally Critical Threat Asset Vulnerability Evaluation